Bug 1936805 (CVE-2021-24033) - CVE-2021-24033 nodejs-react-dev-utils: function getProcessForPort concatenates input argument into a command string
Summary: CVE-2021-24033 nodejs-react-dev-utils: function getProcessForPort concatenate...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-24033
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1936806
TreeView+ depends on / blocked
 
Reported: 2021-03-09 08:23 UTC by Michael Kaplan
Modified: 2023-08-31 09:11 UTC (History)
37 users (show)

Fixed In Version: nodejs-react-dev-utils 11.0.4
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-03-24 11:35:11 UTC
Embargoed:


Attachments (Terms of Use)

Description Michael Kaplan 2021-03-09 08:23:18 UTC
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.

Comment 2 Przemyslaw Roguski 2021-03-12 13:27:40 UTC
The react-dev-utils package exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. If you use the react-dev-utils as a part of the react-scripts then you are not affected by this flaw. 

Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection.

In OpenShift Container Platform and OpenShift Service Mesh the react-dev-utils is used only during the build process and it's used within react-scripts, hence these products are not affected by this flaw.

Comment 3 Product Security DevOps Team 2021-03-24 11:35:11 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-24033


Note You need to log in before you can comment on or make changes to this bug.