CVE-2022-31180

Shescape is a simple shell escape package for JavaScript. Affected versions were found to have insufficient escaping of white space when interpolating output. This issue only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. The result is that if an attacker is able to include whitespace in their input they can: 1. Invoke shell-specific behaviour through shell-specific special characters inserted directly after whitespace. 2. Invoke shell-specific behaviour through shell-specific special characters inserted or appearing after line terminating characters. 3. Invoke arbitrary commands by inserting a line feed character. 4. Invoke arbitrary commands by inserting a carriage return character. Behaviour number 1 has been patched in [v1.5.7] which you can upgrade to now. No further changes are required. Behaviour number 2, 3, and 4 have been patched in [v1.5.8] which you can upgrade to now. No further changes are required. The best workaround is to avoid having to use the `interpolation: true` option - in most cases using an alternative is possible, see [the recipes](https://github.com/ericcornelissen/shescape#recipes) for recommendations. Alternatively, users may strip all whitespace from user input. Note that this is error prone, for example: for PowerShell this requires stripping `'\u0085'` which is not included in JavaScript's definition of `\s` for Regular Expressions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shescape_project:shescape:*:*:*:*:*:*:*:*

History

24 Jul 2023, 13:07

Type Values Removed Values Added
CWE CWE-74 NVD-CWE-Other

09 Aug 2022, 17:36

Type Values Removed Values Added
CPE cpe:2.3:a:shescape_project:shescape:*:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h - (CONFIRM) https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h - Exploit, Third Party Advisory
References (MISC) https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8 - (MISC) https://github.com/ericcornelissen/shescape/releases/tag/v1.5.8 - Release Notes, Third Party Advisory
References (MISC) https://github.com/ericcornelissen/shescape/pull/324 - (MISC) https://github.com/ericcornelissen/shescape/pull/324 - Patch, Third Party Advisory
References (MISC) https://github.com/ericcornelissen/shescape/pull/322 - (MISC) https://github.com/ericcornelissen/shescape/pull/322 - Patch, Third Party Advisory
References (MISC) https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7 - (MISC) https://github.com/ericcornelissen/shescape/releases/tag/v1.5.7 - Release Notes, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-74

01 Aug 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-08-01 20:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-31180

Mitre link : CVE-2022-31180

CVE.ORG link : CVE-2022-31180


JSON object : View

Products Affected

shescape_project

  • shescape
CWE
NVD-CWE-Other CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')