Loading HuntDB...

CVE-2021-24033

UNKNOWN
Published 2021-03-09T00:25:13
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2021-24033. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed MODERATE

react-dev-utils OS Command Injection in function `getProcessForPort`

GHSA-5q6m-3h65-w53x

Advisory Details

react-dev-utils prior to v11.0.4 exposes a function, `getProcessForPort`, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Affected Packages

npm react-dev-utils
ECOSYSTEM: ≥0.4.0 <11.0.4

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Advisory provided by GitHub Security Advisory Database. Published: March 11, 2021, Modified: August 3, 2022

References

Published: 2021-03-09T00:25:13
Last Modified: 2024-08-03T19:21:17.286Z
Copied to clipboard!