CVE-2021-23359: Improper Input Validation
(updated )
If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process
exec
function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
References
Detect and mitigate CVE-2021-23359 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →