Skip to content

Latest commit

 

History

History
22 lines (19 loc) · 604 Bytes

libnotify_potential_command_injection_in_libnotify.notify.md

File metadata and controls

22 lines (19 loc) · 604 Bytes

title: Potential command injection in libnotify.notify author: Adam Baldwin module_name: libnotify publish_date: 2013-05-15T22:30:05.853Z cve: CVE-temp vulnerable_versions: "<= 1.0.3" patched_versions: ">= 1.0.4" ...

Overview

Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this.

Example

var libnotify = require('libnotify')
libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () {
    console.log(arguments);
})

Special thanks to Neal Poole for submitting the pull request to fix this issue.