CVE-2013-7378:
Potential Command Injection in hubot-scripts
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
8/31/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
hubot-scripts | npm | <= 2.4.3 | 2.4.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using child_process.exec() with unescaped user input to build a mail command string. The commit feee5ab shows the fix: replacing exec() with execFile() and argument arrays. The original exec() call in sendEmail combined user inputs into a shell command without proper sanitization, making it vulnerable to injection. CWE-74 (Injection) and the patch methodology confirm this assessment.