Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTZxNDgtdmpxMi1td2Nq
Command Injection in umount
All versions of umount
are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an exec
call on the umount
function . This may allow attackers to execute arbitrary code in the system if the device
value passed to the function is user-controlled.
Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
Permalink: https://github.com/advisories/GHSA-6q48-vjq2-mwcjJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTZxNDgtdmpxMi1td2Nq
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: almost 4 years ago
Updated: over 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-6q48-vjq2-mwcj, CVE-2020-7628
References:
- https://nvd.nist.gov/vuln/detail/CVE-2020-7628
- https://snyk.io/vuln/SNYK-JS-UMOUNT-564265
- https://www.npmjs.com/advisories/1512
- https://github.com/advisories/GHSA-6q48-vjq2-mwcj
Affected Packages
npm:umount
Dependent packages: 10Dependent repositories: 16
Downloads: 112 last month
Affected Version Ranges: <= 1.1.6
No known fixed version
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6