Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRncDMtcDdwaC14Mmpy
OS Command Injection in devcert-sanscache
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable commonName
controlled by user input is used as part of the exec
function without any sanitization.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTRncDMtcDdwaC14Mmpy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 5 years ago
Updated: about 2 years ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Percentage: 0.00347
EPSS Percentile: 0.71504
Identifiers: GHSA-4gp3-p7ph-x2jr, CVE-2019-10778
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10778
- https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8
- https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926
- https://github.com/advisories/GHSA-4gp3-p7ph-x2jr
Blast Radius: 30.2
Affected Packages
npm:devcert-sanscache
Dependent packages: 9Dependent repositories: 1,211
Downloads: 397,039 last month
Affected Version Ranges: < 0.4.7
Fixed in: 0.4.7
All affected versions: 0.4.0, 0.4.1, 0.4.2, 0.4.3, 0.4.5, 0.4.6
All unaffected versions: 0.4.7, 0.4.8, 0.5.0, 0.5.1