mirror of
https://github.com/apache/cordova-android.git
synced 2025-02-22 00:32:55 +08:00
feat: Account for Node security patch (#1778)
As of https://nodejs.org/en/blog/vulnerability/april-2024-security-releases-2#command-injection-via-args-parameter-of-child_processspawn-without-shell-option-enabled-on-windows-cve-2024-27980---high Cordova produce unrecognized error on Windows. Fixes: https://github.com/apache/cordova-cli/issues/456 --------- Co-authored-by: Norman Breau <norman@breautek.com>
This commit is contained in:
parent
eb0f002112
commit
8f458b042b
@ -110,7 +110,9 @@ module.exports.get_gradle_wrapper = function () {
|
||||
let program_dir;
|
||||
// OK, This hack only works on Windows, not on Mac OS or Linux. We will be deleting this eventually!
|
||||
if (module.exports.isWindows()) {
|
||||
const result = execa.sync(path.join(__dirname, 'getASPath.bat'));
|
||||
// "shell" option enabled for CVE-2024-27980 (Windows) Mitigation
|
||||
// See https://nodejs.org/en/blog/vulnerability/april-2024-security-releases-2 for more details
|
||||
const result = execa.sync(path.join(__dirname, 'getASPath.bat'), { shell: true });
|
||||
// console.log('result.stdout =' + result.stdout.toString());
|
||||
// console.log('result.stderr =' + result.stderr.toString());
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user