Arbitrary Command Injection

Affecting buttle package, ALL versions

Overview

buttle is a Simple static file (+ markdown) server.

Affected versions of this package are vulnerable to Arbitrary Command Injection. When buttle is run with --php-bin option (to handle PHP), the PHP filename is not sanitized and allows to inject shell commands.

Remediation

There is no fix version for buttle.

References

Do your applications use this vulnerable package?

CVSS Score

10.0
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Changed
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H/E:F/RL:U/RC:C
Credit
bl4de
CWE
CWE-264
Snyk ID
npm:buttle:20180512
Disclosed
12 May, 2018
Published
13 May, 2018