Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

local-devices mislabeled as code-injection #15

Open
ericcornelissen opened this issue Sep 30, 2024 · 5 comments
Open

local-devices mislabeled as code-injection #15

ericcornelissen opened this issue Sep 30, 2024 · 5 comments

Comments

@ericcornelissen
Copy link

ericcornelissen commented Sep 30, 2024

The vulnerability in [email protected] is mislabeled as code injection while it is actually command injection. The listed code location points to an call to child_process.exec in:

/**
 * Reads the arp table for a single address.
 */
function arpOne (address) {
  return cp.exec('arp -n ' + address).then(parseOne)
}

Also, the Proof of Concept has a command injection payload and not a code injection payload.

@cristianstaicu
Copy link
Owner

I agree with you, however Snyk labeled this vulnerability as code injection at the time (https://security.snyk.io/vuln/SNYK-JS-LOCALDEVICES-459898), so we decided to keep this label. Did you find any other such entry in the dataset? I am considering moving it, as you suggested, into the command-injection folder.

@ericcornelissen
Copy link
Author

I agree with you, however Snyk labeled this vulnerability as code injection at the time (security.snyk.io/vuln/SNYK-JS-LOCALDEVICES-459898), so we decided to keep this label.

I see, though their own description disagrees:

The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.

and the GHA entry does label it as command injection, see GHSA-w725-67p7-xv22

Did you find any other such entry in the dataset?

So far not. I will probably only be evaluating the code injections and have reached (in the GitHub directory order) up to and including mosc_1.0.0.

@ericcornelissen
Copy link
Author

Another case: open, see:

require("open")('""`touch open`', () => {


@ericcornelissen
Copy link
Author

ericcornelissen commented Oct 4, 2024

Another case: wifiscanner, see:


@ericcornelissen
Copy link
Author

That's all entries in code-injection that are mislabeled from what I can tell.

Overview

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants