Hotfix - shell injection vulnerability#1354
Merged
DavidsonGomes merged 3 commits intoEvolutionAPI:developfrom Apr 8, 2025
Merged
Hotfix - shell injection vulnerability#1354DavidsonGomes merged 3 commits intoEvolutionAPI:developfrom
DavidsonGomes merged 3 commits intoEvolutionAPI:developfrom
Conversation
Contributor
Reviewer's Guide by SourceryThis pull request addresses a shell injection vulnerability by replacing Sequence diagram for killing the processsequenceDiagram
participant P as Process
P->>P: Calls execFileSync('kill', ['-9', `${pid}`])
P->>OS: Sends kill signal to process with PID
OS-->>P: Process is terminated
Sequence diagram for cleaning store datasequenceDiagram
participant W as WAMonitoringService
W->>W: Calls execFileSync('rm', ['-rf', instancePath])
W->>OS: Sends command to remove directory recursively
OS-->>W: Directory is removed
File-Level Changes
Assessment against linked issues
Possibly linked issues
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
Contributor
There was a problem hiding this comment.
Hey @jeffersonfelixdev - I've reviewed your changes - here's some feedback:
Overall Comments:
- Thanks for fixing this vulnerability, using
execFileSyncis definitely the right approach.
Here's what I looked at during the review
- 🟡 General issues: 1 issue found
- 🟢 Security: all looks good
- 🟢 Testing: all looks good
- 🟢 Complexity: all looks good
- 🟢 Documentation: all looks good
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This Pull request change execSync to execFileSync, to avoid shell injection vulnerability.
@DavidsonGomes please priorize this hotfix to production
This closes #1348
Summary by Sourcery
Implement security fix to prevent shell injection vulnerability by replacing execSync with execFileSync
Bug Fixes:
Chores: