OS Command Injection in GitHub repository ljharb/npm-lockfile in v2.0.3 and v2.0.4.
References
Link | Resource |
---|---|
https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8 | Patch Third Party Advisory |
https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1 | Exploit Patch Third Party Advisory |
https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8 | Patch Third Party Advisory |
https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1 - Exploit, Patch, Third Party Advisory |
Information
Published : 2022-03-03 16:15
Updated : 2024-11-21 06:39
NVD link : CVE-2022-0841
Mitre link : CVE-2022-0841
CVE.ORG link : CVE-2022-0841
JSON object : View
Products Affected
npm-lockfile_project
- npm-lockfile
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')