NuProcess is an external process execution implementation for Java. In all the versions of NuProcess where it forks processes by using the JVM's Java_java_lang_UNIXProcess_forkAndExec method (1.2.0+), attackers can use NUL characters in their strings to perform command line injection. Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProcess is missing that check. This vulnerability can only be exploited to inject command line arguments on Linux. Version 2.0.5 contains a patch. As a workaround, users of the library can sanitize command strings to remove NUL characters prior to passing them to NuProcess for execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 22 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-22T17:20:18.073Z

Reserved: 2022-09-02T00:00:00.000Z

Link: CVE-2022-39243

cve-icon Vulnrichment

Updated: 2024-08-03T12:00:43.337Z

cve-icon NVD

Status : Modified

Published: 2022-09-26T14:15:10.407

Modified: 2024-11-21T07:17:51.717

Link: CVE-2022-39243

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.