Skip to content

Command Injection in gitlabhook

Critical severity GitHub Reviewed Published Sep 16, 2019 to the GitHub Advisory Database • Updated Jun 1, 2023

Package

npm gitlabhook (npm)

Affected versions

<= 0.0.17

Patched versions

None

Description

All versions of gitlabhook are vulnerable to Command Injection. The package does not validate input the body of POST request and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.

Recommendation

No fix is currently available. Consider using an alternative package until a fix is made available.

References

Published by the National Vulnerability Database Sep 13, 2019
Reviewed Sep 16, 2019
Published to the GitHub Advisory Database Sep 16, 2019
Last updated Jun 1, 2023

Severity

Critical
10.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2019-5485

GHSA ID

GHSA-549f-73hh-mj38

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.