Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhteGgtZzd3ai04bTRt
OS Command Injection in curling
npm package curling
before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXhteGgtZzd3ai04bTRt
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: over 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-xmxh-g7wj-8m4m, CVE-2019-10789
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10789
- https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56
- https://snyk.io/vuln/SNYK-JS-CURLING-546484
- https://github.com/advisories/GHSA-xmxh-g7wj-8m4m
Blast Radius: 10.2
Affected Packages
npm:curling
Dependent packages: 6Dependent repositories: 11
Downloads: 61 last month
Affected Version Ranges: <= 1.0.0
Fixed in: 1.1.0
All affected versions: 0.1.0, 0.2.0, 0.3.0, 1.0.0
All unaffected versions: 1.1.0