ID GHSA-JCW8-R9XM-32C6
Type github
Reporter GitHub Advisory Database
Modified 2021-01-08T18:35:10
Description
Affected versions of dns-sync
have an arbitrary command execution vulnerability in the resolve()
method.
Recommendation
- Use an alternative dns resolver
- Do not allow untrusted input into
dns-sync.resolve()
{"id": "GHSA-JCW8-R9XM-32C6", "bulletinFamily": "software", "title": "Command Injection in dns-sync", "description": "Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method. \n\n\n\n## Recommendation\n\n- Use an alternative dns resolver\n- Do not allow untrusted input into `dns-sync.resolve()`", "published": "2018-07-18T18:28:02", "modified": "2021-01-08T18:35:10", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://github.com/advisories/GHSA-jcw8-r9xm-32c6", "reporter": "GitHub Advisory Database", "references": ["https://github.com/advisories/GHSA-jcw8-r9xm-32c6", "https://nvd.nist.gov/vuln/detail/CVE-2017-16100"], "cvelist": ["CVE-2017-16100"], "type": "github", "lastseen": "2021-01-08T22:27:17", "edition": 4, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2017-16100"]}, {"type": "nodejs", "idList": ["NODEJS:523"]}, {"type": "github", "idList": ["GHSA-JCW8-R9XM-32C6"]}], "modified": "2021-01-08T22:27:17", "rev": 2}, "score": {"value": 7.1, "vector": "NONE", "modified": "2021-01-08T22:27:17", "rev": 2}, "vulnersScore": 7.1}, "affectedSoftware": [{"name": "dns-sync", "operator": "lt", "version": "0.1.1"}], "scheme": null}
{"cve": [{"lastseen": "2020-12-09T20:13:25", "description": "dns-sync is a sync/blocking dns resolver. If untrusted user input is allowed into the resolve() method then command injection is possible.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-06-07T02:29:00", "title": "CVE-2017-16100", "type": "cve", "cwe": ["CWE-77"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-16100"], "modified": "2019-10-09T23:24:00", "cpe": ["cpe:/a:dns-sync_project:dns-sync:0.1.1"], "id": "CVE-2017-16100", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16100", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:dns-sync_project:dns-sync:0.1.1:*:*:*:*:node.js:*:*"]}], "nodejs": [{"lastseen": "2020-09-29T11:10:46", "bulletinFamily": "software", "cvelist": ["CVE-2017-16100"], "description": "## Overview\n\nAffected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method. \n\n\n## Recommendation\n\n- Use an alternative dns resolver\n- Do not allow untrusted input into `dns-sync.resolve()`\n\n## References\n\n- [Issue #1](https://github.com/skoranga/node-dns-sync/issues/1)\n- [Commit #d9abaae](https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)", "modified": "2019-06-24T15:18:14", "published": "2017-09-06T23:32:56", "id": "NODEJS:523", "href": "https://www.npmjs.com/advisories/523", "type": "nodejs", "title": "Command Injection", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}