Command Injection Affecting heroku-env package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.25% (66th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-HEROKUENV-1050432
- published 26 Jan 2021
- disclosed 26 Jan 2021
- credit JHU System Security Lab
Introduced: 26 Jan 2021
CVE-2020-28437 Open this link in a new tabHow to fix?
There is no fixed version for heroku-env
.
Overview
heroku-env is a package that parse the DATABASE_URL from your heroku config and split it out into the PG* environment variables used by psql pg_dump pg_restore and node_postgres
Affected versions of this package are vulnerable to Command Injection. The injection point is located in lib/get.js
which is required by index.js
.
PoC
var root = require("heroku-env");
root("& touch JHU","aa", function (){});
CVSS Scores
version 3.1