The openssl (aka node-openssl) NPM package through 2.0.0 was characterized as "a nonsense wrapper with no real purpose" by its author, and accepts an opts argument that contains a verb field (used for command execution). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://gist.github.com/mcoimbra/b05a55a5760172dccaa0a827647ad63e | Exploit Third Party Advisory |
https://github.com/ossf/malicious-packages/tree/main/malicious/npm | Patch |
https://www.npmjs.com/package/openssl | Product |
Configurations
History
No history.
Information
Published : 2023-11-23 20:15
Updated : 2024-05-17 02:31
NVD link : CVE-2023-49210
Mitre link : CVE-2023-49210
CVE.ORG link : CVE-2023-49210
JSON object : View
Products Affected
node-openssl_project
- node-openssl
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')