Vulnerabilities/

@saltcorn/plugins-loader unsanitized plugin name leads to a remote code execution (RCE) vulnerability when creating plug

Severity:
High

Description

When creating a new plugin using the git source, the user-controlled value req.body.name is used to build the plugin directory where the location will be cloned. The API used to execute the git clone command with the user-controlled data is child_process.execSync.

Recommendation

Update the @saltcorn/plugins-loader package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@saltcorn/plugins-loader
Anything's wrong? Let us know Last updated on October 04, 2024

This issue is available in SmartScanner Professional

See Pricing