Potential Command Injection in shell-quote
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Feb 18, 2019 
          to the GitHub Advisory Database
          •
          Updated Feb 2, 2023 
      
  
Description
        Published by the National Vulnerability Database
      May 31, 2018 
    
  
        Published to the GitHub Advisory Database
      Feb 18, 2019 
    
  
        Reviewed
      Jun 16, 2020 
    
  
        Last updated
      Feb 2, 2023 
    
  
Affected versions of
shell-quotedo not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments.Proof of Concept:
The following characters are not escaped properly:
>,;,{,}Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of
{}and using the,instead ofto seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible.Recommendation
Update to version 1.6.1 or later.
References