Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlocWotMzhqMi01amdt
Command Injection in ascii-art
Versions of ascii-art
before 1.4.4 are vulnerable to command injection. This is exploitable when user input is passed into the argument of the ascii-art preview
command.
Example Proof of concept:
ascii-art preview 'doom"; touch /tmp/malicious; echo "'
Given that the input is passed on the command line and none of the api methods are vulnerable to this, the likely exploitation vector is when the ascii-art comment is being called programmatically using something like execFile
.
Recommendation
Update to version 1.4.4 or later.
Permalink: https://github.com/advisories/GHSA-9hqj-38j2-5jgmJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTlocWotMzhqMi01amdt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: over 4 years ago
Updated: about 2 years ago
Identifiers: GHSA-9hqj-38j2-5jgm
References:
- https://hackerone.com/reports/390631
- https://github.com/nodejs/security-wg/blob/master/vuln/npm/471.json
- https://www.npmjs.com/advisories/727
- https://github.com/advisories/GHSA-9hqj-38j2-5jgm
Affected Packages
npm:ascii-art
Dependent packages: 150Dependent repositories: 322
Downloads: 7,188 last month
Affected Version Ranges: <= 1.4.2
Fixed in: 1.4.4
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0, 1.4.2
All unaffected versions: 1.4.3, 1.4.4, 1.5.0, 1.5.1, 2.0.2, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 2.1.4, 2.1.5, 2.1.6, 2.2.1, 2.2.2, 2.2.3, 2.3.0, 2.3.1, 2.4.0, 2.5.0, 2.6.0, 2.7.0, 2.8.0, 2.8.1, 2.8.2, 2.8.3, 2.8.4, 2.8.5