CVE-2018-21268

The traceroute (aka node-traceroute) package through 1.0.0 for Node.js allows remote command injection via the host parameter. This occurs because the Child.exec() method, which is considered to be not entirely safe, is used. In particular, an OS command can be placed after a newline character.
Configurations

Configuration 1 (hide)

cpe:2.3:a:traceroute_project:traceroute:*:*:*:*:*:node.js:*:*

History

07 Nov 2023, 02:56

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3', 'name': 'https://medium.com/@shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40shay_62828/shell-command-injection-through-traceroute-npm-package-a4cf7b6553e3 -

Information

Published : 2020-06-25 17:15

Updated : 2024-02-28 17:47


NVD link : CVE-2018-21268

Mitre link : CVE-2018-21268

CVE.ORG link : CVE-2018-21268


JSON object : View

Products Affected

traceroute_project

  • traceroute
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')