CVE-2021-23380

This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:roar-pidusage_project:roar-pidusage:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 05:51

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 7.3
v2 : 7.5
v3 : 5.6
References () https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 - Broken Link () https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 - Broken Link
References () https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 - Exploit, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 - Exploit, Third Party Advisory

Information

Published : 2021-04-18 19:15

Updated : 2024-11-21 05:51


NVD link : CVE-2021-23380

Mitre link : CVE-2021-23380

CVE.ORG link : CVE-2021-23380


JSON object : View

Products Affected

roar-pidusage_project

  • roar-pidusage
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')