Arbitrary Command Execution Affecting windows-cpu package, versions *
Threat Intelligence
EPSS
0.87% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:windows-cpu:20170417
- published 19 May 2017
- disclosed 19 May 2017
- credit Daniel Bond
Introduced: 19 May 2017
CVE-2017-1000219 Open this link in a new tabHow to fix?
There is no fix version for windows-cpu
.
Overview
windows-cpu
is a CPU monitoring utility for windows.
Affected versions of this package are vulnerable to Arbitrary Command Execution via the findLoad
method, which passes a user-inputed string to the shell without validation.
Proof of Concept: This code will open the built-in calculator program.
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
References
CVSS Scores
version 3.1