9.8
CVSSv3

CVE-2021-42740

Published: 21/10/2021 Updated: 28/10/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The shell-quote package prior to 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

shell-quote project shell-quote

Vendor Advisories

Debian Bug report logs - #998418 node-shell-quote: CVE-2021-42740 Package: src:node-shell-quote; Maintainer for src:node-shell-quote is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 3 Nov 2021 21:42:02 UTC Severity: grav ...