docker-compose-remote-api through 0.1.4 allows execution of arbitrary commands. Within 'index.js' of the package, the function 'exec(serviceName, cmd, fnStdout, fnStderr, fnExit)' uses the variable 'serviceName' which can be controlled by users without any sanitization.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1162 | docker-compose-remote-api through 0.1.4 allows execution of arbitrary commands. Within 'index.js' of the package, the function 'exec(serviceName, cmd, fnStdout, fnStderr, fnExit)' uses the variable 'serviceName' which can be controlled by users without any sanitization. |
Github GHSA |
GHSA-q6pj-jh94-5fpr | OS Command Injection in docker-compose-remote-api |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://snyk.io/vuln/SNYK-JS-DOCKERCOMPOSEREMOTEAPI-560125 |
|
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T09:33:19.966Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7606
No data.
Status : Modified
Published: 2020-03-15T22:15:14.880
Modified: 2024-11-21T05:37:27.763
Link: CVE-2020-7606
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA