Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: nvmetcfg

Found 1 matching suggestions

View:
Compact
Detailed
created 1 month, 3 weeks ago
Command Injection in nvm via NVM_AUTH_HEADER in wget code path

A command injection vulnerability exists in nvm (Node Version Manager) versions 0.40.3 and below. The nvm_download() function uses eval to execute wget commands, and the NVM_AUTH_HEADER environment variable was not sanitized in the wget code path (though it was sanitized in the curl code path). An attacker who can set environment variables in a victim's shell environment (e.g., via malicious CI/CD configurations, compromised dotfiles, or Docker images) can inject arbitrary shell commands that execute when the victim runs nvm commands that trigger downloads, such as 'nvm install' or 'nvm ls-remote'.

Affected products

nvm
  • =<0.40.3
  • ==0.40.4

Matching in nixpkgs

pkgs.convmv

Converts filenames from one encoding to another

pkgs.krunvm

CLI-based utility for creating microVMs from OCI images

pkgs.nvme-rs

Lightweight tool for monitoring NVMe drive health with email alerts

pkgs.crc64fast-nvme

SIMD accelerated carryless-multiplication CRC-64/NVME checksum computation (based on Intel's PCLMULQDQ paper)

pkgs.cudaPackages_11.cuda_nvml_dev

CUDA NVML Headers. By downloading and using the packages you accept the terms and conditions of the CUDA EULA