CVE-2020-8298

fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
References
Link Resource
https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7 Patch Third Party Advisory
https://github.com/pillys/fs-path/pull/6 Exploit Patch Third Party Advisory
https://hackerone.com/reports/324491 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fs-path_project:fs-path:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2021-03-04 20:15

Updated : 2021-03-09 15:20


NVD link : CVE-2020-8298

Mitre link : CVE-2020-8298

CVE.ORG link : CVE-2020-8298


JSON object : View

Products Affected

fs-path_project

  • fs-path
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')