First published: Mon Dec 31 2018(Updated: )
react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook react-dev-utils | >=1.0.0<1.0.4 | |
Facebook react-dev-utils | >=2.0.0<2.0.2 | |
Facebook react-dev-utils | >=3.0.0<3.1.2 | |
Facebook react-dev-utils | >=4.0.0<4.2.2 | |
Facebook react-dev-utils | >=5.0.0<5.0.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6342 is a vulnerability in react-dev-utils on Windows that allows an attacker to launch an editor by sending a network request to the server.
CVE-2018-6342 has a severity rating of 9.8 (critical).
React-dev-utils versions 1.0.0 to 1.0.4, 2.0.0 to 2.0.2, 3.0.0 to 3.1.2, 4.0.0 to 4.2.2, and 5.0.0 to 5.0.2 on Windows are affected by CVE-2018-6342.
An attacker can exploit CVE-2018-6342 by making a network request to the server hosting react-dev-utils.
To fix CVE-2018-6342, update react-dev-utils to version 1.1.5 or higher.