All the vulnerabilites related to ericcornelissen - shescape
cve-2023-40185
Vulnerability from cvelistv5
Published
2023-08-23 20:20
Modified
2024-09-30 19:14
Severity ?
EPSS score ?
Summary
shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549 | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/pull/1142 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: < 1.7.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:24:55.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549" }, { "name": "https://github.com/ericcornelissen/shescape/pull/1142", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/1142" }, { "name": "https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40185", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-30T19:09:19.179504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-30T19:14:01.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003c 1.7.4" } ] } ], "descriptions": [ { "lang": "en", "value": "shescape is simple shell escape library for JavaScript. This may impact users that use Shescape on Windows in a threaded context. The vulnerability can result in Shescape escaping (or quoting) for the wrong shell, thus allowing attackers to bypass protections depending on the combination of expected and used shell. This bug has been patched in version 1.7.4." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-150", "description": "CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-23T20:20:45.807Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-j55r-787p-m549" }, { "name": "https://github.com/ericcornelissen/shescape/pull/1142", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/1142" }, { "name": "https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/commit/0b976dab645abf45ffd85e74a8c6e51ee2f42d63" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.4" } ], "source": { "advisory": "GHSA-j55r-787p-m549", "discovery": "UNKNOWN" }, "title": "Shescape on Windows escaping may be bypassed in threaded context" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-40185", "datePublished": "2023-08-23T20:20:45.807Z", "dateReserved": "2023-08-09T15:26:41.053Z", "dateUpdated": "2024-09-30T19:14:01.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31179
Vulnerability from cvelistv5
Published
2022-08-01 19:20
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Shescape is a simple shell escape package for JavaScript. Versions prior to 1.5.8 were found to be subject to code injection on windows. This impacts users that use Shescape (any API function) to escape arguments for cmd.exe on Windows An attacker can omit all arguments following their input by including a line feed character (`'\n'`) in the payload. This bug has been patched in [v1.5.8] which you can upgrade to now. No further changes are required. Alternatively, line feed characters (`'\n'`) can be stripped out manually or the user input can be made the last argument (this only limits the impact).
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/pull/332 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: < 1.5.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003c 1.5.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Shescape is a simple shell escape package for JavaScript. Versions prior to 1.5.8 were found to be subject to code injection on windows. This impacts users that use Shescape (any API function) to escape arguments for cmd.exe on Windows An attacker can omit all arguments following their input by including a line feed character (`\u0027\\n\u0027`) in the payload. This bug has been patched in [v1.5.8] which you can upgrade to now. No further changes are required. Alternatively, line feed characters (`\u0027\\n\u0027`) can be stripped out manually or the user input can be made the last argument (this only limits the impact)." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-01T19:20:17", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/332" } ], "source": { "advisory": "GHSA-jjc5-fp7p-6f8w", "discovery": "UNKNOWN" }, "title": "Insufficient escaping of line feeds for CMD in shescape", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31179", "STATE": "PUBLIC", "TITLE": "Insufficient escaping of line feeds for CMD in shescape" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shescape", "version": { "version_data": [ { "version_value": "\u003c 1.5.8" } ] } } ] }, "vendor_name": "ericcornelissen" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shescape is a simple shell escape package for JavaScript. Versions prior to 1.5.8 were found to be subject to code injection on windows. This impacts users that use Shescape (any API function) to escape arguments for cmd.exe on Windows An attacker can omit all arguments following their input by including a line feed character (`\u0027\\n\u0027`) in the payload. This bug has been patched in [v1.5.8] which you can upgrade to now. No further changes are required. Alternatively, line feed characters (`\u0027\\n\u0027`) can be stripped out manually or the user input can be made the last argument (this only limits the impact)." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" }, { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w", "refsource": "CONFIRM", "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w" }, { "name": "https://github.com/ericcornelissen/shescape/pull/332", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/pull/332" } ] }, "source": { "advisory": "GHSA-jjc5-fp7p-6f8w", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31179", "datePublished": "2022-08-01T19:20:18", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35931
Vulnerability from cvelistv5
Published
2023-06-23 19:32
Modified
2024-12-05 16:09
Severity ?
EPSS score ?
Summary
Shescape is a simple shell escape library for JavaScript. An attacker may be able to get read-only access to environment variables. This bug has been patched in version 1.7.1.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/pull/982 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: < 1.7.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:37:40.072Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r" }, { "name": "https://github.com/ericcornelissen/shescape/pull/982", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/982" }, { "name": "https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35931", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T16:08:36.951164Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T16:09:33.483Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003c 1.7.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shescape is a simple shell escape library for JavaScript. An attacker may be able to get read-only access to environment variables. This bug has been patched in version 1.7.1.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-526", "description": "CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-23T19:32:53.897Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r" }, { "name": "https://github.com/ericcornelissen/shescape/pull/982", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/982" }, { "name": "https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/commit/d0fce70f987ac0d8331f93cb45d47e79436173ac" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.7.1" } ], "source": { "advisory": "GHSA-3g7p-8qhx-mc8r", "discovery": "UNKNOWN" }, "title": "Shescape potential environment variable exposure on Windows with CMD" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-35931", "datePublished": "2023-06-23T19:32:53.897Z", "dateReserved": "2023-06-20T14:02:45.593Z", "dateUpdated": "2024-12-05T16:09:33.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-36064
Vulnerability from cvelistv5
Published
2022-09-06 20:55
Modified
2024-08-03 09:52
Severity ?
EPSS score ?
Summary
Shescape is a shell escape package for JavaScript. An Inefficient Regular Expression Complexity vulnerability impacts users that use Shescape to escape arguments for the Unix shells `Bash` and `Dash`, or any not-officially-supported Unix shell; and/or using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. An attacker can cause polynomial backtracking or quadratic runtime in terms of the input string length due to two Regular Expressions in Shescape that are vulnerable to Regular Expression Denial of Service (ReDoS). This bug has been patched in v1.5.10. For `Dash` only, this bug has been patched since v1.5.9. As a workaround, a maximum length can be enforced on input strings to Shescape to reduce the impact of the vulnerability. It is not recommended to try and detect vulnerable input strings, as the logic for this may end up being vulnerable to ReDoS itself.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3 | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/pull/373 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: >= 1.5.1, < 1.5.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:52:00.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/373" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003e= 1.5.1, \u003c 1.5.10" } ] } ], "descriptions": [ { "lang": "en", "value": "Shescape is a shell escape package for JavaScript. An Inefficient Regular Expression Complexity vulnerability impacts users that use Shescape to escape arguments for the Unix shells `Bash` and `Dash`, or any not-officially-supported Unix shell; and/or using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. An attacker can cause polynomial backtracking or quadratic runtime in terms of the input string length due to two Regular Expressions in Shescape that are vulnerable to Regular Expression Denial of Service (ReDoS). This bug has been patched in v1.5.10. For `Dash` only, this bug has been patched since v1.5.9. As a workaround, a maximum length can be enforced on input strings to Shescape to reduce the impact of the vulnerability. It is not recommended to try and detect vulnerable input strings, as the logic for this may end up being vulnerable to ReDoS itself." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-06T20:55:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/373" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10" } ], "source": { "advisory": "GHSA-gp75-h7j6-5pv3", "discovery": "UNKNOWN" }, "title": "Shescape Inefficient Regular Expression Complexity vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-36064", "STATE": "PUBLIC", "TITLE": "Shescape Inefficient Regular Expression Complexity vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shescape", "version": { "version_data": [ { "version_value": "\u003e= 1.5.1, \u003c 1.5.10" } ] } } ] }, "vendor_name": "ericcornelissen" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shescape is a shell escape package for JavaScript. An Inefficient Regular Expression Complexity vulnerability impacts users that use Shescape to escape arguments for the Unix shells `Bash` and `Dash`, or any not-officially-supported Unix shell; and/or using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. An attacker can cause polynomial backtracking or quadratic runtime in terms of the input string length due to two Regular Expressions in Shescape that are vulnerable to Regular Expression Denial of Service (ReDoS). This bug has been patched in v1.5.10. For `Dash` only, this bug has been patched since v1.5.9. As a workaround, a maximum length can be enforced on input strings to Shescape to reduce the impact of the vulnerability. It is not recommended to try and detect vulnerable input strings, as the logic for this may end up being vulnerable to ReDoS itself." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-1333: Inefficient Regular Expression Complexity" } ] }, { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3", "refsource": "CONFIRM", "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-gp75-h7j6-5pv3" }, { "name": "https://github.com/ericcornelissen/shescape/pull/373", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/pull/373" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.10" } ] }, "source": { "advisory": "GHSA-gp75-h7j6-5pv3", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-36064", "datePublished": "2022-09-06T20:55:10", "dateReserved": "2022-07-15T00:00:00", "dateUpdated": "2024-08-03T09:52:00.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21384
Vulnerability from cvelistv5
Published
2021-03-18 23:50
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
shescape is a simple shell escape package for JavaScript. In shescape before version 1.1.3, anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a into the payload. For an example see the referenced GitHub Security Advisory. The problem has been patched in version 1.1.3. No further changes are required.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3 | x_refsource_MISC | |
https://www.npmjs.com/package/shescape | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: < 1.1.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/shescape" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003c 1.1.3" } ] } ], "descriptions": [ { "lang": "en", "value": "shescape is a simple shell escape package for JavaScript. In shescape before version 1.1.3, anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a into the payload. For an example see the referenced GitHub Security Advisory. The problem has been patched in version 1.1.3. No further changes are required." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-88", "description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T23:50:13", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/shescape" } ], "source": { "advisory": "GHSA-f2rp-38vg-j3gh", "discovery": "UNKNOWN" }, "title": "Null characters not escaped in shescape", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21384", "STATE": "PUBLIC", "TITLE": "Null characters not escaped in shescape" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shescape", "version": { "version_data": [ { "version_value": "\u003c 1.1.3" } ] } } ] }, "vendor_name": "ericcornelissen" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "shescape is a simple shell escape package for JavaScript. In shescape before version 1.1.3, anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a into the payload. For an example see the referenced GitHub Security Advisory. The problem has been patched in version 1.1.3. No further changes are required." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh", "refsource": "CONFIRM", "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh" }, { "name": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3" }, { "name": "https://www.npmjs.com/package/shescape", "refsource": "MISC", "url": "https://www.npmjs.com/package/shescape" } ] }, "source": { "advisory": "GHSA-f2rp-38vg-j3gh", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21384", "datePublished": "2021-03-18T23:50:13", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31180
Vulnerability from cvelistv5
Published
2022-08-01 19:15
Modified
2024-08-03 07:11
Severity ?
EPSS score ?
Summary
Shescape is a simple shell escape package for JavaScript. Affected versions were found to have insufficient escaping of white space when interpolating output. This issue only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. The result is that if an attacker is able to include whitespace in their input they can: 1. Invoke shell-specific behaviour through shell-specific special characters inserted directly after whitespace. 2. Invoke shell-specific behaviour through shell-specific special characters inserted or appearing after line terminating characters. 3. Invoke arbitrary commands by inserting a line feed character. 4. Invoke arbitrary commands by inserting a carriage return character. Behaviour number 1 has been patched in [v1.5.7] which you can upgrade to now. No further changes are required. Behaviour number 2, 3, and 4 have been patched in [v1.5.8] which you can upgrade to now. No further changes are required. The best workaround is to avoid having to use the `interpolation: true` option - in most cases using an alternative is possible, see [the recipes](https://github.com/ericcornelissen/shescape#recipes) for recommendations. Alternatively, users may strip all whitespace from user input. Note that this is error prone, for example: for PowerShell this requires stripping `'\u0085'` which is not included in JavaScript's definition of `\s` for Regular Expressions.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/pull/322 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/pull/324 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: >=1.4.0 < 1.5.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:11:39.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/322" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/324" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003e=1.4.0 \u003c 1.5.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Shescape is a simple shell escape package for JavaScript. Affected versions were found to have insufficient escaping of white space when interpolating output. This issue only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. The result is that if an attacker is able to include whitespace in their input they can: 1. Invoke shell-specific behaviour through shell-specific special characters inserted directly after whitespace. 2. Invoke shell-specific behaviour through shell-specific special characters inserted or appearing after line terminating characters. 3. Invoke arbitrary commands by inserting a line feed character. 4. Invoke arbitrary commands by inserting a carriage return character. Behaviour number 1 has been patched in [v1.5.7] which you can upgrade to now. No further changes are required. Behaviour number 2, 3, and 4 have been patched in [v1.5.8] which you can upgrade to now. No further changes are required. The best workaround is to avoid having to use the `interpolation: true` option - in most cases using an alternative is possible, see [the recipes](https://github.com/ericcornelissen/shescape#recipes) for recommendations. Alternatively, users may strip all whitespace from user input. Note that this is error prone, for example: for PowerShell this requires stripping `\u0027\\u0085\u0027` which is not included in JavaScript\u0027s definition of `\\s` for Regular Expressions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-01T19:15:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/322" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/324" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" } ], "source": { "advisory": "GHSA-44vr-rwwj-p88h", "discovery": "UNKNOWN" }, "title": "Insufficient escaping of whitespace in shescape", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-31180", "STATE": "PUBLIC", "TITLE": "Insufficient escaping of whitespace in shescape" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shescape", "version": { "version_data": [ { "version_value": "\u003e=1.4.0 \u003c 1.5.8" } ] } } ] }, "vendor_name": "ericcornelissen" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shescape is a simple shell escape package for JavaScript. Affected versions were found to have insufficient escaping of white space when interpolating output. This issue only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. The result is that if an attacker is able to include whitespace in their input they can: 1. Invoke shell-specific behaviour through shell-specific special characters inserted directly after whitespace. 2. Invoke shell-specific behaviour through shell-specific special characters inserted or appearing after line terminating characters. 3. Invoke arbitrary commands by inserting a line feed character. 4. Invoke arbitrary commands by inserting a carriage return character. Behaviour number 1 has been patched in [v1.5.7] which you can upgrade to now. No further changes are required. Behaviour number 2, 3, and 4 have been patched in [v1.5.8] which you can upgrade to now. No further changes are required. The best workaround is to avoid having to use the `interpolation: true` option - in most cases using an alternative is possible, see [the recipes](https://github.com/ericcornelissen/shescape#recipes) for recommendations. Alternatively, users may strip all whitespace from user input. Note that this is error prone, for example: for PowerShell this requires stripping `\u0027\\u0085\u0027` which is not included in JavaScript\u0027s definition of `\\s` for Regular Expressions." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h", "refsource": "CONFIRM", "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h" }, { "name": "https://github.com/ericcornelissen/shescape/pull/322", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/pull/322" }, { "name": "https://github.com/ericcornelissen/shescape/pull/324", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/pull/324" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7" }, { "name": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8" } ] }, "source": { "advisory": "GHSA-44vr-rwwj-p88h", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-31180", "datePublished": "2022-08-01T19:15:16", "dateReserved": "2022-05-18T00:00:00", "dateUpdated": "2024-08-03T07:11:39.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-24725
Vulnerability from cvelistv5
Published
2022-03-03 21:35
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, "\\~")`.
References
▼ | URL | Tags |
---|---|---|
https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f | x_refsource_CONFIRM | |
https://github.com/ericcornelissen/shescape/issues/169 | x_refsource_MISC | |
https://github.com/ericcornelissen/shescape/pull/170 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ericcornelissen | shescape |
Version: >= 1.4.0, < 1.5.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:49.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/issues/169" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/ericcornelissen/shescape/pull/170" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "shescape", "vendor": "ericcornelissen", "versions": [ { "status": "affected", "version": "\u003e= 1.4.0, \u003c 1.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, \"\\\\~\")`." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-03T21:35:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/issues/169" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/ericcornelissen/shescape/pull/170" } ], "source": { "advisory": "GHSA-446w-rrm4-r47f", "discovery": "UNKNOWN" }, "title": "Exposure of home directory through shescape on Unix with Bash", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24725", "STATE": "PUBLIC", "TITLE": "Exposure of home directory through shescape on Unix with Bash" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "shescape", "version": { "version_data": [ { "version_value": "\u003e= 1.4.0, \u003c 1.5.1" } ] } } ] }, "vendor_name": "ericcornelissen" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Shescape is a shell escape package for JavaScript. An issue in versions 1.4.0 to 1.5.1 allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. Depending on how the output of _shescape_ is used, directory traversal may be possible in the application using _shescape_. The issue was patched in version 1.5.1. As a workaround, manually escape all instances of the tilde character (`~`) using `arg.replace(/~/g, \"\\\\~\")`." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f", "refsource": "CONFIRM", "url": "https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f" }, { "name": "https://github.com/ericcornelissen/shescape/issues/169", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/issues/169" }, { "name": "https://github.com/ericcornelissen/shescape/pull/170", "refsource": "MISC", "url": "https://github.com/ericcornelissen/shescape/pull/170" } ] }, "source": { "advisory": "GHSA-446w-rrm4-r47f", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24725", "datePublished": "2022-03-03T21:35:10", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:49.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }