-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
local-devices
mislabeled as code-injection
#15
Comments
I agree with you, however Snyk labeled this vulnerability as code injection at the time (https://security.snyk.io/vuln/SNYK-JS-LOCALDEVICES-459898), so we decided to keep this label. Did you find any other such entry in the dataset? I am considering moving it, as you suggested, into the command-injection folder. |
I see, though their own description disagrees:
and the GHA entry does label it as command injection, see GHSA-w725-67p7-xv22
So far not. I will probably only be evaluating the code injections and have reached (in the GitHub directory order) up to and including |
Another case:
|
Another case:
|
That's all entries in code-injection that are mislabeled from what I can tell. Overview |
The vulnerability in
[email protected]
is mislabeled as code injection while it is actually command injection. The listed code location points to an call tochild_process.exec
in:Also, the Proof of Concept has a command injection payload and not a code injection payload.
The text was updated successfully, but these errors were encountered: