CVE-2018-6342

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-6342
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-6342.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2018-6342
Aliases
Published
2018-12-31T22:29:00Z
Modified
2025-01-08T05:26:59.408778Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2.

References

Affected packages

Git / github.com/facebook/create-react-app

Affected ranges

Type
GIT
Repo
https://github.com/facebook/create-react-app
Events

Affected versions

babel-preset-react-app@3.*

babel-preset-react-app@3.0.0

create-react-app@1.*

create-react-app@1.3.1

eslint-config-react-app@1.*

eslint-config-react-app@1.0.0
eslint-config-react-app@1.0.1
eslint-config-react-app@1.0.2

react-dev-utils@1.*

react-dev-utils@1.0.0
react-dev-utils@1.0.1
react-dev-utils@1.0.2
react-dev-utils@1.0.3

react-error-overlay@1.*

react-error-overlay@1.0.0
react-error-overlay@1.0.1
react-error-overlay@1.0.2
react-error-overlay@1.0.3

react-scripts@1.*

react-scripts@1.0.0
react-scripts@1.0.1
react-scripts@1.0.2
react-scripts@1.0.3

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3