turbo-ignore is vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
70
High Risk
Affected versions of this package contain a Command Injection in turbo-ignore Git Ref Validation vulnerability, where the use of execSync with shell commands allowed user-supplied git references from environment variables to be interpreted as shell commands. The fix replaces execSync with execFileSync to ensure inputs are treated as literal arguments. An attacker could exploit this by crafting a malicious git ref value (e.g., containing ; rm -rf /) within a controlled environment variable, which would then be executed with the application's privileges when the validation script runs.
You are affected if you are using a vulnerable version of the package.
turbo-ignore is vulnerable to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in versions 1.10.14 - 2.6.2.
Upgrade the turbo-ignore library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant