Command Injection Affecting connection-tester package, versions <0.2.1


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.61% (80th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-CONNECTIONTESTER-1048337
  • published 16 Dec 2020
  • disclosed 4 Dec 2020
  • credit JHU System Security Lab

How to fix?

Upgrade connection-tester to version 0.2.1 or higher.

Overview

connection-tester is a module that tests to check if the connection can be established or host/port reachable for a given host and port. Useful for testing all the connection in your node application at server startup.

Affected versions of this package are vulnerable to Command Injection. The injection point is located in line 15 in index.js.

The following PoC demonstrates the vulnerability:

PoC

var a = require("connection-tester");
a.test("& touch 111","& touch 222",123)

References

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
9.8 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    High
Expand this section

NVD

9.8 critical