This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
References
Link | Resource |
---|---|
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 | Broken Link |
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 | Exploit Third Party Advisory |
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 | Broken Link |
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 5.6 |
References | () https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 - Broken Link | |
References | () https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 - Exploit, Third Party Advisory |
Information
Published : 2021-04-18 19:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23380
Mitre link : CVE-2021-23380
CVE.ORG link : CVE-2021-23380
JSON object : View
Products Affected
roar-pidusage_project
- roar-pidusage
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')