Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Injection vulnerabilities in an interactive lesson.
Start learningUpgrade github.com/gen2brain/dlgs
to version 0.0.0-20210609125024-bf6c92aaa984 or higher.
github.com/gen2brain/dlgs is a cross-platform library for displaying dialogs and input boxes.
Affected versions of this package are vulnerable to Arbitrary Code Injection. The current MacOS implementation of dlgs
is vulnerable to code injection through unescaped text being sent to the osascript
command.
Info("Proof of Concept\" buttons {\"OK\"} \n tell application \"Calculator\" to activate \n--", "Hello, Calculator.app!")
// ^ ^- Open Calculator.app ^
// |- Break out of the title string. |- Comment out the rest of the original AppleScript.