An Arbitrary Command Injection vulnerability was reported in portprocesses
impacting versions <= 1.0.4.
The following example demonstrates the vulnerability and will run touch success
therefore creating a file named success
.
const portprocesses = require("portprocesses");
portprocesses.killProcess("$(touch success)");
{ "nvd_published_at": "2021-03-31T15:15:00Z", "github_reviewed_at": "2021-03-31T17:50:32Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-77", "CWE-78" ] }