logo

GHSA-wgw3-gf4p-62xc wizard-syncronizer

Package

Manager: npm
Name: wizard-syncronizer
Vulnerable Version: >=0 <=0.0.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N/E:H/RL:U/RC:R

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: N/A pctlN/A

Details

Command Injection in wizard-syncronizer All versions of `wizard-syncronizer` are vulnerable to Command Injection. The package does not validate input on the `cloneAndSync` function and concatenates it to an exec call. This can be abused through a malicious widget containing the payload in the `gitURL` value or through a MITM attack since the package does not enforce HTTPS. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.

Metadata

Created: 2020-09-11T21:16:59Z
Modified: 2020-08-31T18:42:46Z
Source: MANUAL
CWE IDs: ["CWE-79"]
Alternative ID: N/A
Finding: F425
Auto approve: 1