codecov@1.0.1 vulnerabilities

Uploading report to Codecov: https://codecov.io

Direct Vulnerabilities

Known vulnerabilities in the codecov package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Command Injection

codecov is a npm package for uploading reports to Codecov.

Affected versions of this package are vulnerable to Command Injection via the upload method.

Note: This vulnerability exists due to an incomplete fix of CVE-2020-7597.

How to fix Command Injection?

Upgrade codecov to version 3.7.1 or higher.

<3.7.1
  • M
Command Injection

codecov is a npm package for uploading reports to Codecov.

Affected versions of this package are vulnerable to Command Injection. The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.

PoC by JHU System Security Lab

var root = require("codecov");
var args = {
  "options": {
    'gcov-root': "& touch exploit &",
    'gcov-exec': ' ',
    'gcov-args': ' '
  }
}
root.handleInput.upload(args, function(){}, function(){});

How to fix Command Injection?

Upgrade codecov to version 3.6.5 or higher.

<3.6.5
  • M
Command Injection

codecov is a npm package for uploading reports to Codecov.

Affected versions of this package are vulnerable to Command Injection. The value provided as part of the gcov-args argument is executed by the exec function within lib/codecov.js.

PoC by JHU System Security Lab

var root = require("codecov");
var args = {
  "options": {
    'gcov-args': "& touch PWNED &"
  }
}
root.handleInput.upload(args, function(){}, function(){});

How to fix Command Injection?

Upgrade codecov to version 3.6.2 or higher.

<3.6.2