react-dev-utils@3.0.2 vulnerabilities

webpack utilities used by Create React App

Direct Vulnerabilities

Known vulnerabilities in the react-dev-utils package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Command Injection

react-dev-utils is an includes some utilities used by Create React App.

Affected versions of this package are vulnerable to Command Injection via getProcessForPort - where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

How to fix Command Injection?

Upgrade react-dev-utils to version 11.0.4 or higher.

<11.0.4
  • H
Arbitrary Code Execution

react-dev-utils includes some utilities used by Create React App.

Affected versions of this package are vulnerable to Arbitrary Code Execution. On Windows, developers are allowed to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system.

How to fix Arbitrary Code Execution?

Upgrade react-dev-utils to version 1.0.4, 2.0.2, 3.1.2, 4.2.2, 5.0.2 or higher.

>=1.0.0 <1.0.4 >=2.0.0 <2.0.2 >=3.0.0 <3.1.2 >=4.0.0 <4.2.2 >=5.0.0 <5.0.2