Command Injection Affecting react-dev-utils Open this link in a new tab package, versions <11.0.4


0.0
medium
  • Exploit Maturity

    Proof of concept

  • Attack Complexity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JS-REACTDEVUTILS-1083268

  • published

    9 Mar 2021

  • disclosed

    9 Mar 2021

  • credit

    zpbrent(zhou, peng@shu)

How to fix?

Upgrade react-dev-utils to version 11.0.4 or higher.

Overview

react-dev-utils is an includes some utilities used by Create React App.

Affected versions of this package are vulnerable to Command Injection via getProcessForPort - where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.