Skip to content
This repository has been archived by the owner on Jul 11, 2023. It is now read-only.

huntr.dev - Code Injection #69

Open
huntr-helper opened this issue May 8, 2020 · 2 comments
Open

huntr.dev - Code Injection #69

huntr-helper opened this issue May 8, 2020 · 2 comments

Comments

@huntr-helper
Copy link

This issue has been generated on-behalf of Mik317 (https://huntr.dev/app/users/Mik317)

Vulnerability Description

Affected versions execute arbitrary commands remotely inside the victim's PC. The issue occurs because user input is formatted inside a command that will be executed without any checks. The spawn function receives the _executableShell variable, which is the /bin/sh command. This could result in any command, even if the function is written correctly, leading to RCE.

The issue arises here:

https://github.com/mattijs/node-rsync/blob/master/rsync.js#L506

Bug Bounty

We have opened up a bounty for this issue on our bug bounty platform. Want to solve this vulnerability and get rewarded 💰? Go to https://huntr.dev/

@AdamGold
Copy link

@mattijs
Hi! My name is Adam and I am part of the Snyk Security team. We have POCd this vulnerability, and we have tried contacting you through emails to no avail. We would like to discuss the nature of this issue.
We'd appreciate if a contributor/maintainer could get in touch with us via the vulnerability disclosure form or email us at [email protected].
Thanks!

@JamieSlome
Copy link

Hey @AdamGold - we have actually sourced a fix (#70) that we are waiting to get approved by @mattijs 🍰

Let us know if we can be of any help 😄

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants