Description
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0612 | react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you. |
Github GHSA |
GHSA-5q6m-3h65-w53x | react-dev-utils OS Command Injection in function `getProcessForPort` |
References
History
No history.
Status: PUBLISHED
Assigner: facebook
Published:
Updated: 2024-08-03T19:21:17.286Z
Reserved: 2021-01-13T00:00:00.000Z
Link: CVE-2021-24033
No data.
Status : Modified
Published: 2021-03-09T01:15:13.433
Modified: 2024-11-21T05:52:15.083
Link: CVE-2021-24033
OpenCVE Enrichment
No data.
EUVD
Github GHSA