SYM_JSTS_0087 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Property Value
Language javascript
Severity medium
CWE CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
OWASP A01:2017 - Injection
Confidence Level Low
Impact Level High
Likelihood Level Low

Description

Using user-controlled input as a command in child_process functions (like exec or spawn) can allow attackers to inject malicious commands. This happens when input isn't properly validated or sanitized before being passed to the system shell.

Impact

If exploited, an attacker could execute arbitrary system commands on your server, potentially leading to data theft, data loss, system compromise, or service disruption. This could grant unauthorized access, escalate privileges, or allow full control over the affected system.