First published: Mon Aug 01 2022(Updated: )
Shescape is a simple shell escape package for JavaScript. Versions prior to 1.5.8 were found to be subject to code injection on windows. This impacts users that use Shescape (any API function) to escape arguments for cmd.exe on Windows An attacker can omit all arguments following their input by including a line feed character (`'\n'`) in the payload. This bug has been patched in [v1.5.8] which you can upgrade to now. No further changes are required. Alternatively, line feed characters (`'\n'`) can be stripped out manually or the user input can be made the last argument (this only limits the impact).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Shescape Project Shescape | <1.5.8 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31179 is a vulnerability in the Shescape package for JavaScript that allows code injection on Windows systems.
CVE-2022-31179 has a severity rating of 9.8, which is classified as critical.
Versions of Shescape prior to 1.5.8 are affected by CVE-2022-31179.
An attacker can exploit CVE-2022-31179 by injecting malicious code when using Shescape to escape arguments for cmd.exe on Windows.
To mitigate CVE-2022-31179, users should update their Shescape package to version 1.5.8 or higher.