Miggo Logo

CVE-2020-7627: OS Command Injection in node-key-sender

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.78238%
Published
2/10/2022
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
node-key-sendernpm<= 1.0.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly identifies the execute() function's arrParams argument as the injection vector. The code shows arrParams.join(' ') being directly interpolated into a system command string executed via exec(). There's no input validation or sanitization visible in the code path from user input to command execution. The combination of untrusted input concatenation with exec() creates a classic OS command injection scenario (CWE-78).

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

no**-k*y-s*n**r t*rou** *.*.** is vuln*r**l* to *omm*n* Inj**tion. It *llows *x**ution o* *r*itr*ry *omm*n*s vi* t** '*rrP*r*ms' *r*um*nt in t** '*x**ut*()' *un*tion.

Reasoning

T** vuln*r**ility **s*ription *xpli*itly i**nti*i*s t** `*x**ut*()` *un*tion's *rrP*r*ms *r*um*nt *s t** inj**tion v**tor. T** *o** s*ows *rrP*r*ms.join(' ') **in* *ir**tly int*rpol*t** into * syst*m *omm*n* strin* *x**ut** vi* `*x**()`. T**r*'s no i