CVE-2014-9682

The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dns-sync_project:dns-sync:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:21

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2014/11/11/6 - () http://www.openwall.com/lists/oss-security/2014/11/11/6 -
References () https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d - () https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d -
References () https://github.com/skoranga/node-dns-sync/issues/1 - () https://github.com/skoranga/node-dns-sync/issues/1 -

Information

Published : 2015-02-28 01:59

Updated : 2024-11-21 02:21


NVD link : CVE-2014-9682

Mitre link : CVE-2014-9682

CVE.ORG link : CVE-2014-9682


JSON object : View

Products Affected

dns-sync_project

  • dns-sync
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')