- Description
 - NuProcess is an external process execution implementation for Java. In all the versions of NuProcess where it forks processes by using the JVM's Java_java_lang_UNIXProcess_forkAndExec method (1.2.0+), attackers can use NUL characters in their strings to perform command line injection. Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProcess is missing that check. This vulnerability can only be exploited to inject command line arguments on Linux. Version 2.0.5 contains a patch. As a workaround, users of the library can sanitize command strings to remove NUL characters prior to passing them to NuProcess for execution.
 - Source
 - security-advisories@github.com
 - NVD status
 - Modified
 
CVSS 3.1
- Type
 - Primary
 - Base score
 - 9.8
 - Impact score
 - 5.9
 - Exploitability score
 - 3.9
 - Vector string
 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
 - Severity
 - CRITICAL
 
- security-advisories@github.com
 - CWE-77
 - nvd@nist.gov
 - NVD-CWE-Other
 
- Hype score
 - Not currently trending
 
[
  {
    "nodes": [
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:a:nuprocess_project:nuprocess:*:*:*:*:*:*:*:*",
            "vulnerable": true,
            "matchCriteriaId": "7A3FB441-B053-438A-92B0-70FEDFA4A66E",
            "versionEndExcluding": "2.0.5",
            "versionStartIncluding": "1.2.0"
          }
        ],
        "operator": "OR"
      },
      {
        "negate": false,
        "cpeMatch": [
          {
            "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "vulnerable": false,
            "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
          }
        ],
        "operator": "OR"
      }
    ],
    "operator": "AND"
  }
]