react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.
External References: https://github.com/facebook/create-react-app/pull/10644 https://www.facebook.com/security/advisories/cve-2021-24033
The react-dev-utils package exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. If you use the react-dev-utils as a part of the react-scripts then you are not affected by this flaw. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. In OpenShift Container Platform and OpenShift Service Mesh the react-dev-utils is used only during the build process and it's used within react-scripts, hence these products are not affected by this flaw.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-24033