Skip to content

Command Injection in dot

Moderate severity GitHub Reviewed Published Jun 5, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm dot (npm)

Affected versions

<= 1.1.2

Patched versions

None

Description

All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.

References

Reviewed Jun 5, 2019
Published to the GitHub Advisory Database Jun 5, 2019
Last updated Jan 9, 2023

Severity

Moderate

EPSS score

Weaknesses

Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-4859-gpc7-4j66

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.