Arbitrary Command Injection Affecting com.zaxxer:nuprocess package, versions [1.2.0,2.0.5)


0.0
critical

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.15% (51st percentile)
Expand this section
NVD
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-COMZAXXER-3033308
  • published 26 Sep 2022
  • disclosed 26 Sep 2022
  • credit Unknown

How to fix?

Upgrade com.zaxxer:nuprocess to version 2.0.5 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection due to improper user-input sanitization, allowing attackers to use NUL characters in their strings in order to craft a malicious payload.

** Note: ** Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProcess is missing that check.

This vulnerability can only be exploited to inject command line arguments on Linux.

Workaround:

Users who are unable to upgrade to the fixed version can sanitize command strings to remove NUL characters prior to passing them to NuProcess for execution.