OS Command Injection in pulverizr
Critical severity
GitHub Reviewed
Published
May 7, 2021
to the GitHub Advisory Database
•
Updated Sep 6, 2023
Description
Published by the National Vulnerability Database
Mar 15, 2020
Reviewed
May 4, 2021
Published to the GitHub Advisory Database
May 7, 2021
Last updated
Sep 6, 2023
pulverizr through 0.7.0 allows execution of arbitrary commands. Within
lib/job.js
, the variablefilename
can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.References