Closed huntr-helper closed 4 years ago
Got in touch with npm regarding this report and we've agreed that this is not an issue:
We agree with your assessment and agree that only very unusual usage of the package would lead to an exploitable scenario.
I've updated the package documentation to state that it should not "accept arbitrary user input": c09f1131f2308c6b4cf2efb1d9d608d245dd6f37 and released a new patch: https://github.com/pirelenito/git-revision-webpack-plugin/releases/tag/v3.0.5
@pirelenito - thanks for clarifying with NPM and the new release! 🍰 🎉
Vulnerability Description
The function
commithash
withinlib/helpers/run-git-command.js
takes user input, and is passed to thegitCommand
argument without any sanitization.Steps To Reproduce:
Bug Bounty
We have opened up a bounty for this issue on our bug bounty platform. Want to solve this vulnerability and get rewarded 💰? Go to https://huntr.dev/