-
-
Notifications
You must be signed in to change notification settings - Fork 207
Description
A command injection vulnerability in Sigma File Manager versions 1.0.0 through 1.7.0 allows local attackers to execute arbitrary shell commands with the privileges of the application process. The issue resides in the MAKE_DIR_ITEM_LINK action in src/store.js, where user-controlled file paths (e.g., srcPath from selected directory items) are passed to fsManager.getCommand without sanitization and executed via childProcess.spawn with sh on Linux or powershell on Windows. This enables malicious commands to be executed by crafting file paths with shell metacharacters.
Details:
- Affected Versions: 1.0.0–1.7.0
- Component:
src/store.js,in ligne :4853MAKE_DIR_ITEM_LINKaction,fsManager.getCommandfunction - Impact: Arbitrary code execution (CWE-78: OS Command Injection)
- CVSS v3.1: 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
- Status: Reported to MITRE for CVE
I can share further details privately via email (anasshopme@gmail.com). Recommended mitigations include using Node.js fs.symlink or sanitizing paths with shell-escape.
@Alixey @alexhx5 @OfficialEsco @JakobDev