You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 11, 2023. It is now read-only.
Affected versions execute arbitrary commands remotely inside the victim's PC. The issue occurs because user input is formatted inside a command that will be executed without any checks. The spawn function receives the _executableShell variable, which is the /bin/sh command. This could result in any command, even if the function is written correctly, leading to RCE.
@mattijs
Hi! My name is Adam and I am part of the Snyk Security team. We have POCd this vulnerability, and we have tried contacting you through emails to no avail. We would like to discuss the nature of this issue.
We'd appreciate if a contributor/maintainer could get in touch with us via the vulnerability disclosure form or email us at [email protected].
Thanks!
This issue has been generated on-behalf of Mik317 (https://huntr.dev/app/users/Mik317)
Vulnerability Description
Affected versions execute arbitrary commands remotely inside the victim's PC. The issue occurs because user input is formatted inside a
command
that will be executed without any checks. Thespawn
function receives the_executableShell
variable, which is the/bin/sh
command. This could result in any command, even if the function is written correctly, leading toRCE
.The issue arises here:
https://github.com/mattijs/node-rsync/blob/master/rsync.js#L506
Bug Bounty
We have opened up a bounty for this issue on our bug bounty platform. Want to solve this vulnerability and get rewarded 💰? Go to https://huntr.dev/
The text was updated successfully, but these errors were encountered: