Command Injection Affecting kill-port-process package, versions <2.2.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of concept
EPSS
25.73% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-KILLPORTPROCESS-543829
  • published31 Jan 2020
  • disclosed30 Jan 2020
  • crediteffectrenan

Introduced: 30 Jan 2020

CVE-2019-15609  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade kill-port-process to version 2.2.0 or higher.

Overview

Affected versions of this package are vulnerable to Command Injection. An attacker able to control the port number can insert a shell command instead of a port number, due to weak sanitisation. The command will run under the root user, since the root user is the only user able to execute the kill command.

CVSS Scores

version 3.1