Potential Command Injection in shell-quote
Critical severity
GitHub Reviewed
Published
Feb 18, 2019
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
May 31, 2018
Published to the GitHub Advisory Database
Feb 18, 2019
Reviewed
Jun 16, 2020
Last updated
Feb 2, 2023
Affected versions of
shell-quote
do not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments.Proof of Concept:
The following characters are not escaped properly:
>
,;
,{
,}
Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of
to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible.
{}
and using the,
instead ofRecommendation
Update to version 1.6.1 or later.
References