Skip to content

Commit 9d595a8

Browse files
Sync security vulnerabilities (#1522)
1 parent 20440f4 commit 9d595a8

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

vuln/core/141.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,11 @@
44
],
55
"vulnerable": "18.x || 20.x || 21.x",
66
"patched": "^18.20.2 || ^20.12.2 || ^21.7.3",
7-
"ref": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases-2/",
7+
"ref": "https://nodejs.org/en/blog/vulnerability/april-2024-security-releases-2",
8+
"description": "Command injection via args parameter of child_process.spawn without shell option enabled on Windows",
89
"overview": "Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.",
910
"affectedEnvironments": [
1011
"win32"
1112
],
12-
"severity": "medium"
13+
"severity": "high"
1314
}

0 commit comments

Comments
 (0)