Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. sharp
  4. ›
  5. CVE-2022-29256

CVE-2022-29256: Possible vulnerability in sharp at 'npm install' time if an attacker has control over build environment

May 25, 2022 (updated June 28, 2023)

sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at npm install time when installing versions of sharp prior to the latest v0.30.5. If an attacker has the ability to set the value of the PKG_CONFIG_PATH environment variable in a build environment then they might be able to use this to inject an arbitrary command at npm install time. This is not part of any runtime code, does not affect Windows users at all, and is unlikely to affect anyone that already cares about the security of their build environment. This problem is fixed in version 0.30.5.

References

  • github.com/advisories/GHSA-gp95-ppv5-3jc5
  • github.com/lovell/sharp/commit/a6aeef612be50f5868a77481848b1de674216f0c
  • github.com/lovell/sharp/security/advisories/GHSA-gp95-ppv5-3jc5
  • nvd.nist.gov/vuln/detail/CVE-2022-29256

Code Behaviors & Features

Detect and mitigate CVE-2022-29256 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.30.5

Fixed versions

  • 0.30.5

Solution

Upgrade to version 0.30.5 or above.

Impact 6.7 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Source file

npm/sharp/CVE-2022-29256.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.