Skip to content

Commit 736136e

Browse files
Blog: add shell true mention to april sec release (#6665)
* Blog: add shell true mention to april sec release * Update pages/en/blog/vulnerability/april-2024-security-releases-2.md Co-authored-by: Richard Lau <[email protected]> Signed-off-by: Rafael Gonzaga <[email protected]> --------- Signed-off-by: Rafael Gonzaga <[email protected]> Co-authored-by: Richard Lau <[email protected]>
1 parent f57eca1 commit 736136e

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

pages/en/blog/vulnerability/april-2024-security-releases-2.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,11 @@ following issues.
1616

1717
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
1818

19+
It is important to note that there has been a breaking change for Windows users who utilize `child_process.spawn` and `child_process.spawnSync`.
20+
Node.js will now error with `EINVAL` if a `.bat` or `.cmd` file is passed to `child_process.spawn` and `child_process.spawnSync` without the `shell` option set.
21+
If the input to `spawn`/`spawnSync` is sanitized, users can now pass `{ shell: true }` as an option to prevent the occurrence of EINVALs errors.
22+
23+
While it is possible to also pass `--security-revert=CVE-2024-27980` to revert the security patch, we strongly advise against doing so.
1924
Impact:
2025

2126
- This vulnerability affects all Windows users in active release lines: 18.x, 20.x, 21.x

0 commit comments

Comments
 (0)