Skip to content

Improper Neutralization of Special Elements used in a Command ('Command Injection') in @floffah/build

Low severity GitHub Reviewed Published May 27, 2021 in Floffah/build • Updated Jan 9, 2023

Package

npm @floffah/build (npm)

Affected versions

< 1.0.0

Patched versions

1.0.0

Description

Impact

If you are using the esbuild target or command you are at risk of code/option injection. Attackers can use the command line option to maliciously change your settings in order to damage your project.

Patches

The problem has been patched in v1.0.0 as it uses a proper method to pass configs to esbuild/estrella.

Workarounds

There is no work around. You should update asap.

Notes

This notice is mainly just to make sure people update to the latest version. This isn't that bad, but should encourage you to update.

References

@Floffah Floffah published to Floffah/build May 27, 2021
Reviewed May 27, 2021
Published to the GitHub Advisory Database May 28, 2021
Last updated Jan 9, 2023

Severity

Low

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-jcgr-9698-82jx

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.