CVE-2020-28443:
sonar-wrapper Command Injection vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.35335%
CWE
Published
7/26/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
sonar-wrapper | npm | <= 0.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The vulnerability description explicitly mentions lib/sonarRunner.js as the injection point
- The Snyk PoC demonstrates exploitation through the runAnalisys function
- The function name contains a typo ('Analisys') matching the PoC code
- Command injection typically occurs when user input is directly interpolated into system commands
- The options parameter is shown accepting untrusted input that gets executed as part of OS commands