Skip to content

Command Injection in MAKE_DIR_ITEM_LINK Action (RCE) #365

@pescada-dev

Description

@pescada-dev

A command injection vulnerability in Sigma File Manager versions 1.0.0 through 1.7.0 allows local attackers to execute arbitrary shell commands with the privileges of the application process. The issue resides in the MAKE_DIR_ITEM_LINK action in src/store.js, where user-controlled file paths (e.g., srcPath from selected directory items) are passed to fsManager.getCommand without sanitization and executed via childProcess.spawn with sh on Linux or powershell on Windows. This enables malicious commands to be executed by crafting file paths with shell metacharacters.

Details:

  • Affected Versions: 1.0.0–1.7.0
  • Component: src/store.js,in ligne :4853 MAKE_DIR_ITEM_LINK action, fsManager.getCommand function
  • Impact: Arbitrary code execution (CWE-78: OS Command Injection)
  • CVSS v3.1: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
  • Status: Reported to MITRE for CVE

I can share further details privately via email (anasshopme@gmail.com). Recommended mitigations include using Node.js fs.symlink or sanitizing paths with shell-escape.
@Alixey @alexhx5 @OfficialEsco @JakobDev

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions