This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
References
Link | Resource |
---|---|
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 | Broken Link |
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-04-18 19:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-23380
Mitre link : CVE-2021-23380
CVE.ORG link : CVE-2021-23380
JSON object : View
Products Affected
roar-pidusage_project
- roar-pidusage
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')