A command injection vulnerability in egg-scripts <v2.8.1 allows arbitrary shell command execution through a maliciously crafted command line argument.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/eggjs/egg-scripts/pull/26 | third party advisory patch |
https://hackerone.com/reports/388936 | patch third party advisory exploit |
https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md | third party advisory release notes |