Skip to content
This repository has been archived by the owner on Aug 13, 2021. It is now read-only.

Security Notice & Bug Bounty - Remote Code Execution - huntr.dev #9

Open
huntr-helper opened this issue Jul 23, 2020 · 1 comment
Open

Comments

@huntr-helper
Copy link

This issue has been generated on-behalf of Mik317 (https://huntr.dev/app/users/Mik317)

Vulnerability Description

The issue occurs because a user input is formatted inside a command that will be executed without any check. The issue arises here: https://github.com/balderdashy/enpeem/blob/master/index.js#L82 . The options should be inserted in the 2' position as arguments and not be concatenated inside the main command without any check.

POC

// poc.js
var npm = require('enpeem');
npm.update({production:'test; touch HACKED; #', path:''});

Impact

RCE via command formatting on `enpeem

Bug Bounty

We have opened up a bounty for this issue on our bug bounty platform. Want to solve this vulnerability and get rewarded 💰? Go to https://huntr.dev/

We will submit a pull request directly to your repository with the fix as soon as possible. Want to learn more? Go to https://github.com/418sec/huntr 📚

Automatically generated by @huntr-helper...

@huntr-helper
Copy link
Author

‎‍🛠️ A fix has been provided for this issue. Please reference: 418sec#1

🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Development

No branches or pull requests

1 participant