Skip to content

Conversation

@huntr-helper
Copy link

https://huntr.dev/users/d3m0n-r00t has fixed the Remote Code Execution vulnerability 🔨. d3m0n-r00t has been awarded $25 for fixing the vulnerability through the huntr bug bounty program 💵. Think you could fix a vulnerability like this?

Get involved at https://huntr.dev/

Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/npm/gitwin/1/README.md

User Comments:

📊 Metadata *

Fixed RCE in gitwin

Bounty URL: https://www.huntr.dev/bounties/1-npm-gitwin

⚙️ Description *

The gitwin module is vulnerable against RCE since a command is crafted using user inputs not validated and then executed, leading to arbitrary command injection.

💻 Technical Description *

Fixed RCE by using execFile instead of exec

🐛 Proof of Concept (PoC) *

var _gitwin = require('gitwin');
var gitwin = new _gitwin();
gitwin.path = "test; touch HACKED; #";
gitwin.pull();

poc

🔥 Proof of Fix (PoF) *

Fixed Rce by using execFile
pof

👍 User Acceptance Testing (UAT)

App seems to run fine.

@JamieSlome
Copy link

JamieSlome commented Oct 23, 2020

@jhaker @UHAKEJO - let me know if you have any questions or thoughts!

Cheers! 🍰

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants