Description
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
Published: 2021-03-09
Score: 5.6 Medium
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0612 react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
Github GHSA Github GHSA GHSA-5q6m-3h65-w53x react-dev-utils OS Command Injection in function `getProcessForPort`
History

No history.

Subscriptions

Facebook React-dev-utils
cve-icon MITRE

Status: PUBLISHED

Assigner: facebook

Published:

Updated: 2024-08-03T19:21:17.286Z

Reserved: 2021-01-13T00:00:00.000Z

Link: CVE-2021-24033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-09T01:15:13.433

Modified: 2024-11-21T05:52:15.083

Link: CVE-2021-24033

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-03-09T00:00:00Z

Links: CVE-2021-24033 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses