提出 #749722: Yued Fe Lulu UI 3 OS Command Injection情報

タイトルYued Fe Lulu UI 3 OS Command Injection
説明A Remote Code Execution vulnerability (CWE-78) exists in the LuLu UI build and documentation synchronization script. The script invokes OS-level commands using child_process.exec() with dynamically constructed command strings. Because exec() spawns a shell and does not enforce argument separation, attackers who can influence the execution environment, Git repository state, or filesystem paths can inject and execute arbitrary OS commands. The vulnerability is particularly dangerous in shared development environments, CI/CD runners, or systems where the repository or filesystem may be modified by untrusted users or automated processes.
ソース⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/lulu.md
ユーザー
 lakshay12311 (UID 91298)
送信2026年01月31日 12:04 (3 月 ago)
モデレーション2026年02月15日 16:54 (15 days later)
ステータス承諾済み
VulDBエントリ346153 [yued-fe LuLu UI 迄 3.0.0 run.js child_process.exec 特権昇格]
ポイント20

Do you need the next level of professionalism?

Upgrade your account now!