Skip to content

[CRITICAL] Fix command injection in library#2

Closed
andreluis034 wants to merge 1 commit intoralt:masterfrom
andreluis034:master
Closed

[CRITICAL] Fix command injection in library#2
andreluis034 wants to merge 1 commit intoralt:masterfrom
andreluis034:master

Conversation

@andreluis034
Copy link
Copy Markdown

This solution fixes the command injection in the library by utilizing execFile instead of exec and by building the arguments in an array.

@andreluis034
Copy link
Copy Markdown
Author

Please see the pr in 418sec#1

@ralt
Copy link
Copy Markdown
Owner

ralt commented Feb 6, 2021

Why are you wasting everyone's time?

@andreluis034
Copy link
Copy Markdown
Author

I just wanted to give the platform huntr.dev a try and accidentally opened a PR directly to your repository instead of the one forked by the platform. If you don't think it is worth fixing the command injection vulnerability in your library at least remove it from npm so that others do not use your vulnerable code accidentally.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants