CVE-2020-15123: Command injection in codecov (npm package)
9.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36041%
CWE
Published
7/20/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
codecov | npm | < 3.7.1 | 3.7.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from using execSync
with command strings constructed from user-influenced inputs. The GitHub commit diff shows the fix involved replacing execSync
with execFileSync
(which avoids shell interpretation) in critical paths. The original code concatenated patterns and user-configurable values (like .bowerrc
directories) into shell commands without proper escaping, leaving it vulnerable to injection via backticks. The explicit mention of CVE-2020-7597
's incomplete fix (blocking '&' but not backticks) and the CodeQL
results confirm this pattern.