The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
References
Configurations
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/11/11/6 - | |
References | () https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d - | |
References | () https://github.com/skoranga/node-dns-sync/issues/1 - |
Information
Published : 2015-02-28 01:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9682
Mitre link : CVE-2014-9682
CVE.ORG link : CVE-2014-9682
JSON object : View
Products Affected
dns-sync_project
- dns-sync
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')