GHSA-6hr9-4692-fch9

Suggest an improvement
Source
https://github.com/advisories/GHSA-6hr9-4692-fch9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-6hr9-4692-fch9/GHSA-6hr9-4692-fch9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6hr9-4692-fch9
Withdrawn
2024-06-04T18:24:58Z
Published
2022-02-10T23:45:54Z
Modified
2024-06-04T18:24:58Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Withdrawn Advisory: OS Command Injection in effect
Details

Withdrawn Advisory

This advisory has been withdrawn because the npm package effect, for which alerts were issued, does not correspond with https://github.com/Javascipt/effect, the repository with the vulnerable code. https://github.com/Javascipt/effect is not in any supported ecosystem.

Additionally, the CVE Numbering Authority that issued the CVE for CVE-2020-7624 has updated their advisory stating that "This was deemed not a vulnerability."

Original Description

effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.

Database specific
{
    "nvd_published_at": "2020-04-02T22:15:00Z",
    "cwe_ids": [
        "CWE-78"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-05-18T23:10:14Z"
}
References

Affected packages

npm / effect

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.4