
Cloud Vulnerability DB
A community-led vulnerabilities database
lifion-verify-dependencies through version 1.1.0 contains a vulnerability that allows OS command injection via a crafted dependency name in the scanned project's package.json file (NVD, MITRE).
The vulnerability exists in the package's dependency verification functionality where it fails to properly validate npm module names before using them in command execution. The issue was discovered in versions up to and including 1.1.0. The vulnerability has been assigned CVE-2021-34078 and allows attackers to inject operating system commands through specially crafted dependency names (Checkmarx Advisory).
A successful exploitation of this vulnerability could allow an attacker to execute arbitrary operating system commands on the affected system through a maliciously crafted dependency name in the package.json file (NVD).
The vulnerability has been fixed by adding validation for npm module names using the validate-npm-package-name package, as evidenced in the patch commit (GitHub Patch). Users should upgrade to a version after 1.1.0 that includes this fix.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."