Arbitrary Code Execution Affecting react-dev-utils package, versions >=1.0.0 <1.0.4>=2.0.0 <2.0.2>=3.0.0 <3.1.2>=4.0.0 <4.2.2>=5.0.0 <5.0.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.19% (58th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-REACTDEVUTILS-72875
  • published2 Jan 2019
  • disclosed22 Aug 2018
  • creditAndrew Clark

Introduced: 22 Aug 2018

CVE-2018-6342  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade react-dev-utils to version 1.0.4, 2.0.2, 3.1.2, 4.2.2, 5.0.2 or higher.

Overview

react-dev-utils includes some utilities used by Create React App.

Affected versions of this package are vulnerable to Arbitrary Code Execution. On Windows, developers are allowed to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system.

CVSS Scores

version 3.1