logo

CVE-2021-24033 react-dev-utils

Package

Manager: npm
Name: react-dev-utils
Vulnerable Version: >=0.4.0 <11.0.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

EPSS: 0.01439 pctl0.7997

Details

react-dev-utils OS Command Injection in function `getProcessForPort` react-dev-utils prior to v11.0.4 exposes a function, `getProcessForPort`, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Metadata

Created: 2021-03-11T22:26:09Z
Modified: 2022-08-03T17:21:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-5q6m-3h65-w53x/GHSA-5q6m-3h65-w53x.json
CWE IDs: ["CWE-78"]
Alternative ID: GHSA-5q6m-3h65-w53x
Finding: F404
Auto approve: 1