Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the theProcess() functionality due to improper user-input sanitization.
References
Link | Resource |
---|---|
https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9 | Broken Link |
https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-06 05:15
Updated : 2023-11-07 03:44
NVD link : CVE-2022-25923
Mitre link : CVE-2022-25923
CVE.ORG link : CVE-2022-25923
JSON object : View
Products Affected
exec-local-bin_project
- exec-local-bin
CWE
NVD-CWE-Other
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')