Open corpetty opened 5 years ago
Thanks for finding!
CWE on this vuln: https://cwe.mitre.org/data/definitions/77.html
Shelljs currently used in devDependencies
section package.json, so it shouldn't appear in production. But that should be double-checked.
@corpetty, @oskarth
Made some investigation:
shelljs
used by react-native
itself (under dev-dependencies
in package.json) and by yeoman-generator
(which is in dependencies
section of package.json)
Inside yeoman-generator
vulnerable exec()
method used in two places to get git info. (node_modules/yeoman-generator/lib/actions/user.js
file), No user input processed.
In react-native
shelljs library used inside helper scripts that aren't included in result application js code:
Implementation of react-native
core and components doesn't use shelljs
, so I think no user input can be passed and executed via vulnerable exec()
function.
For me that looks like we have no problems with this security warning. Wdyt?
I'm going to double check the vulnerability docs for this and see if there are other methods of calling it. If that checks out then we can close this.
Snyk found a vulnerability in this repo that allows for command injection, so it is high severity.
Unfortunately, there isn't an immediately PR-able fix for it via Snyk so more investigation on our end has to take place.
Here is some more info on the problem at hand.