9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.004 Low
EPSS
Percentile
73.0%
NuProcess is an external process execution implementation for Java. In all
the versions of NuProcess where it forks processes by using the JVM’s
Java_java_lang_UNIXProcess_forkAndExec method (1.2.0+), attackers can use
NUL characters in their strings to perform command line injection. Java’s
ProcessBuilder isn’t vulnerable because of a check in ProcessBuilder.start.
NuProcess is missing that check. This vulnerability can only be exploited
to inject command line arguments on Linux. Version 2.0.5 contains a patch.
As a workaround, users of the library can sanitize command strings to
remove NUL characters prior to passing them to NuProcess for execution.
Author | Note |
---|---|
rodrigo-zaiden | NuProcess is included in watchman. |
github.com/brettwooldridge/NuProcess/commit/29bc09de561bf00ff9bf77123756363a9709f868
github.com/brettwooldridge/NuProcess/pull/143
github.com/brettwooldridge/NuProcess/security/advisories/GHSA-cxgf-v2p8-7ph7
launchpad.net/bugs/cve/CVE-2022-39243
nvd.nist.gov/vuln/detail/CVE-2022-39243
security-tracker.debian.org/tracker/CVE-2022-39243
www.cve.org/CVERecord?id=CVE-2022-39243