-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Arbitrary Command Injection #19
Comments
not sure but |
iface is passed as a first parameter to the '.one' method in the public API. |
@zhaparoff (I have no idea what iface is or what it is for.) Are you saying I don't need to worry if I have a Windows machine? |
Just got this as output when installing my dependencies. Maybe flooding the issue, but I think more cases are always welcome. |
|
Hey everyone, I opened a pull request #18 to resolve this. It is my understanding that by using execFile instead of exec you avoid command injection because the arguments are not run in a shell environment. I'd love some input on this though. |
CC: @Logikgate Awesome!! Thank you! Here is another reference: _"The child_process.execFile() function is similar to child_process.exec() except that it does not spawn a shell by default. Rather, the specified executable file is spawned directly as a new process making it slightly more efficient than child_process.exec(). The same options as child_process.exec() are supported. Since a shell is not spawned, behaviors such as I/O redirection and file globbing are not supported."_ Thanks again |
Looks like the maintainer(s) of this project haven't pushed a single commit since 3 years or even be active in the issues/PR lately. Any alternative in mind? |
@theotix We should really try contact him: http://www.scravy.de/ |
@jourdanrodrigues Email sent |
I had also reached out when I opened the PR, but since there are PR requests of more than a year old and no new commits to this repo I think we can safely assume it is abandoned. With that in mind I have published a new npm module based on our fork. This fork will be maintained for security fixes and will be open to feature pull requests from the community. You can use it with: Also, if you're using yarn you can force your sub-modules to use this package by adding the below to your package.json |
@Logikgate I just tried using your suggestion but i got this error: |
NPM's support team is very responsive for issues like this; I'm guessing that if @scravy doesn't respond soon, they'll happily add anyone here as a collaborator to the original package given the large number of dependencies. |
Only @scravy can add collaborators to this repo, not NPM. What npm can do is to attribute the name of the package to someone else. |
@KeitIG agreed; I'm just saying that instead of trying to get hundreds of dependents to move npm packages, we should try to get NPM to add @Logikgate or @theotix as collaborators to the npm package, so they can publish a fix to the original package. |
@transitive-bullshit, wouldn't the admin action need to be here on github and on npm allowing @Logikgate to publish a fixed package? Or are you saying only NPM that would allow @Logikgate to take over the npm package name macaddress? |
@epet the latter |
I accepted pull #20 and released version Thank you all for having an eye on this package. |
Affected versions of this package are vulnerable to Arbitrary Command Injection. An attacker could inject arbitrary shell commands if the user input can influence the iface argument.
https://snyk.io/vuln/npm:macaddress:20180511
The text was updated successfully, but these errors were encountered: