GHSA-9px9-f7jw-fwhj: Command Injection in priest-runner
N/A
CVSS Score
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/3/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
-
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
priest-runner | npm | >= 0.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The GitHub Advisory explicitly identifies PriestController.prototype.createChild
as the vulnerable function. The description confirms that user-controlled input from the POST request is used in a spawn
call without sanitization, which is a textbook command injection vector. No other functions are mentioned in the provided vulnerability details, and the lack of input validation aligns with CWE-77.