logo

CVE-2017-1000220 pidusage

Package

Manager: npm
Name: pidusage
Vulnerable Version: >=0 <1.1.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.11815 pctl0.93466

Details

PIDUsage Enables OS Command Injection ### Overview Affected versions of pidusage pass unsanitized input to `child_process.exec()`, resulting in arbitrary code execution in the `ps` method. This package is vulnerable to this PoC on Darwin, SunOS, FreeBSD, and AIX. Windows and Linux are not vulnerable. ### Proof of Concept ```js var pid = require('pidusage'); pid.stat('1 && /usr/local/bin/python'); ``` ### Remediation Update to version 1.1.5 or later.

Metadata

Created: 2022-05-13T01:41:00Z
Modified: 2024-10-16T16:50:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-h2p3-h48h-9jj7/GHSA-h2p3-h48h-9jj7.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-h2p3-h48h-9jj7
Finding: F404
Auto approve: 1