Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CVE-2024-27980)

CVE编号

CVE-2024-27980

利用情况

暂无

补丁情况

N/A

披露时间

2024-04-09
漏洞描述
A command injection flaw was found in Node.js exclusive to Windows environments. This flaw allows an attacker to perform command injection via the args parameter of child_process.spawn without the shell option enabled on Windows. This behavior is caused by cmd.exe when executing batch files, which has complicated parsing rules for arguments that were not able to be safely escaped. It is possible to inject commands if an attacker can control part of the command arguments of the batch file.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 debian_10 nodejs * Up to
(excluding)
10.24.0~dfsg-1~deb10u4
运行在以下环境
系统 debian_11 nodejs * Up to
(excluding)
12.22.12~dfsg-1~deb11u4
运行在以下环境
系统 debian_12 nodejs * Up to
(excluding)
18.19.0+dfsg-6~deb12u1
运行在以下环境
系统 fedora_39 nodejs18 * Up to
(excluding)
18.20.2-1.fc39
运行在以下环境
系统 fedora_40 nodejs18 * Up to
(excluding)
18.20.2-1.fc40
CVSS3评分
N/A
  • 攻击路径
    N/A
  • 攻击复杂度
    N/A
  • 权限要求
    N/A
  • 影响范围
    N/A
  • 用户交互
    N/A
  • 可用性
    N/A
  • 保密性
    N/A
  • 完整性
    N/A
CWE-ID 漏洞类型
阿里云安全产品覆盖情况