Arbitrary Code Execution Affecting domokeeper package, versions *


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-DOMOKEEPER-451513
  • published4 Jul 2019
  • disclosed4 Jul 2019
  • creditVasiliy Ermilov (inkz)

Introduced: 4 Jul 2019

CVE NOT AVAILABLE CWE-200  (opens in a new tab)
CWE-23  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

There is no fixed version for domokeeper.

Overview

domokeeper is a pluggable domotic control server for Raspberry Pi 2/3.

Affected versions of this package are vulnerable to Arbitrary Code Execution. The path to required module is passed in an HTTP request without any sanitisation, thus making it possible to load code that was not intended to run on the server. In addition, the fact that output of the module is passed to server response directly may cause information leakage. For example it is possible to read package.json file or any other json file.

Steps To Reproduce

  • Install domokeeper and run it
npm i domokeeper 
node node_modules/domokeeper/bin.js
  • Navigating to http://localhost:43569/plugins/.%2Fpackage.json in the browser - the content of package.json file is printed.

CVSS Scores

version 3.1