Miggo Logo

CVE-2022-31180: Shescape vulnerable to insufficient escaping of whitespace

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.35317%
Published
7/15/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
shescapenpm>= 1.4.0, < 1.5.81.5.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability documentation explicitly states impact occurs when using escape/escapeAll with interpolation:true. Multiple pull requests (#322, #324, #332) modifying escaping logic for these functions were required to patch different attack vectors. The functions' purpose (shell escaping) and explicit mention in all impact scenarios make them clear candidates.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t T*is only imp**ts us*rs t**t us* t** `*s**p*` or `*s**p**ll` *un*tions wit* t** `int*rpol*tion` option s*t to `tru*`. *x*mpl*: ```j*v*s*ript import *p *rom "no**:**il*_pro**ss"; import * *s s**s**p* *rom "s**s**p*"; // *. Pr*r*quisit*s

Reasoning

T** vuln*r**ility *o*um*nt*tion *xpli*itly st*t*s imp**t o**urs w**n usin* `*s**p*/*s**p**ll` wit* int*rpol*tion:tru*. Multipl* pull r*qu*sts (#***, #***, #***) mo*i*yin* *s**pin* lo*i* *or t**s* `*un*tions` w*r* r*quir** to p*t** *i***r*nt *tt**k v*