GHSA-wxw2-rwmh-vr8f: electerm: electerm_install_script_CommandInjection Vulnerability Report
What kind of vulnerability is it? Who is impacted?
Two Command Injection vulnerabilities in electerm:
macOS Installer (
electerm_CommandInjection_02): A command injection vulnerability exists ingithub.com/elcterm/electerm/npm/install.js:150. TherunMac()function appends attacker-controlled remotereleaseInfo.namedirectly into anexec("open ...")command without validation.Linux Installer (
electerm_CommandInjection_01): A command injection vulnerability exists ingithub.com/elcterm/electerm/npm/install.js:130. TherunLinux()function appends attacker-controlled remote version strings directly into anexec("rm -rf ...")command without validation.
Who is impacted: Users who run npm install -g electerm. An attacker who can control the remote release metadata (version string or release name) served by the project’s update server could execute arbitrary system commands, tamper local files, and escalate compromise of development/runtime assets.
References
Code Behaviors & Features
Detect and mitigate GHSA-wxw2-rwmh-vr8f with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →