CVE-2024-36138

CWE-77Command Injection6 documents6 sources
Severity
8.1HIGH
EPSS
0.3%
top 50.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 7
Latest updateOct 15

Description

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

CVEListV5nodejs/node4.04.*+18
Alpinenodejs< 0+4

🔴Vulnerability Details

3
GHSA
GHSA-p2ww-p57h-w5m7: Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process2024-09-07
CVEList
CVE-2024-36138: Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process2024-09-07
OSV
CVE-2024-36138: Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process2024-09-07

📋Vendor Advisories

2
Oracle
Oracle Oracle Java SE Risk Matrix: Node (Node.js) — CVE-2024-361382024-10-15
Debian
CVE-2024-36138: nodejs - Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of b...2024