Description
react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0169 | react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2. |
Github GHSA |
GHSA-29gp-92wp-94q8 | react-dev-utils on Windows vulnerable to Remote Code Execution |
References
History
Tue, 06 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: facebook
Published:
Updated: 2025-05-06T16:07:37.832Z
Reserved: 2018-01-26T00:00:00.000Z
Link: CVE-2018-6342
Updated: 2024-08-05T06:01:48.691Z
Status : Modified
Published: 2018-12-31T22:29:00.467
Modified: 2025-05-06T17:15:51.420
Link: CVE-2018-6342
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA