| タイトル | Yued Fe Lulu UI 3 OS Command Injection |
|---|
| 説明 | A Remote Code Execution vulnerability (CWE-78) exists in the LuLu UI build and documentation synchronization script. The script invokes OS-level commands using child_process.exec() with dynamically constructed command strings. Because exec() spawns a shell and does not enforce argument separation, attackers who can influence the execution environment, Git repository state, or filesystem paths can inject and execute arbitrary OS commands.
The vulnerability is particularly dangerous in shared development environments, CI/CD runners, or systems where the repository or filesystem may be modified by untrusted users or automated processes. |
|---|
| ソース | ⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/lulu.md |
|---|
| ユーザー | lakshay12311 (UID 91298) |
|---|
| 送信 | 2026年01月31日 12:04 (3 月 ago) |
|---|
| モデレーション | 2026年02月15日 16:54 (15 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 346153 [yued-fe LuLu UI 迄 3.0.0 run.js child_process.exec 特権昇格] |
|---|
| ポイント | 20 |
|---|