Arbitrary Command Injection Affecting com.zaxxer:nuprocess package, versions [1.2.0,2.0.5)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.64% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-COMZAXXER-3033308
  • published26 Sept 2022
  • disclosed26 Sept 2022
  • creditUnknown

Introduced: 26 Sep 2022

CVE-2022-39243  (opens in a new tab)
CWE-77  (opens in a new tab)

How to fix?

Upgrade com.zaxxer:nuprocess to version 2.0.5 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Command Injection due to improper user-input sanitization, allowing attackers to use NUL characters in their strings in order to craft a malicious payload.

** Note: ** Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProcess is missing that check.

This vulnerability can only be exploited to inject command line arguments on Linux.

Workaround:

Users who are unable to upgrade to the fixed version can sanitize command strings to remove NUL characters prior to passing them to NuProcess for execution.

CVSS Scores

version 3.1