GHSA-xp63-6vf5-xf3v

Suggest an improvement
Source
https://github.com/advisories/GHSA-xp63-6vf5-xf3v
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/07/GHSA-xp63-6vf5-xf3v/GHSA-xp63-6vf5-xf3v.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xp63-6vf5-xf3v
Aliases
Related
Published
2020-07-20T17:20:20Z
Modified
2025-01-14T08:42:11.672471Z
Severity
  • 9.3 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Command injection in codecov (npm package)
Details

Impact

The upload method has a command injection vulnerability. Clients of the codecov-node library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.

A similar CVE was issued: CVE-2020-7597, but the fix was incomplete. It only blocked &, and command injection is still possible using backticks instead to bypass the sanitizer.

We have written a CodeQL query, which automatically detects this vulnerability. You can see the results of the query on the codecov-node project here.

Patches

This has been patched in version 3.7.1

Workarounds

None, however, the attack surface is low in this case. Particularly in the standard use of codecov, where the module is used directly in a build pipeline, not built against as a library in another application that may supply malicious input and perform command injection.

References

For more information

If you have any questions or comments about this advisory: * Contact us via our Security Email

Database specific
{
    "nvd_published_at": null,
    "github_reviewed_at": "2020-07-20T17:19:56Z",
    "severity": "MODERATE",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-78"
    ]
}
References

Affected packages

npm / codecov

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7.1