Command Injection Affecting react-dev-utils package, versions <11.0.4


0.0
medium

Snyk CVSS

    Attack Complexity High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 0.24% (65th percentile)
Expand this section
NVD
5.6 medium
Expand this section
Red Hat
5.6 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-REACTDEVUTILS-1083268
  • published 9 Mar 2021
  • disclosed 9 Mar 2021
  • credit zpbrent(zhou, peng@shu)

How to fix?

Upgrade react-dev-utils to version 11.0.4 or higher.

Overview

react-dev-utils is an includes some utilities used by Create React App.

Affected versions of this package are vulnerable to Command Injection via getProcessForPort - where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.