Potential Command Injection Affecting libnotify package, versions <1.0.4


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Potential Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDnpm:libnotify:20130515
  • published15 May 2013
  • disclosed15 May 2013
  • creditAdam Baldwin

Introduced: 15 May 2013

CVE-2013-7381  (opens in a new tab)
CWE-77  (opens in a new tab)

Overview

Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.

Source: Node Security Project

Details

Example:

var libnotify = require('libnotify')
libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () {
    console.log(arguments);
})

References

Special thanks to Neal Poole for submitting the pull request to fix this issue.

CVSS Scores

version 3.1