Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function.
References
Link | Resource |
---|---|
https://github.com/lorenzomigliorero/npm-node-utils/blob/b55dd81c597db657c9751332bb2242403fd3e26b/index.js%23L186 | Broken Link Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/commit/edbdaff077ea0cf295b1469923c06bbccad3c180 | Patch Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/releases/tag/v3.0.0 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 | Third Party Advisory |
https://github.com/lorenzomigliorero/npm-node-utils/blob/b55dd81c597db657c9751332bb2242403fd3e26b/index.js%23L186 | Broken Link Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/commit/edbdaff077ea0cf295b1469923c06bbccad3c180 | Patch Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/releases/tag/v3.0.0 | Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/lorenzomigliorero/npm-node-utils/blob/b55dd81c597db657c9751332bb2242403fd3e26b/index.js%23L186 - Broken Link, Third Party Advisory | |
References | () https://github.com/rosen-vladimirov/global-modules-path/commit/edbdaff077ea0cf295b1469923c06bbccad3c180 - Patch, Third Party Advisory | |
References | () https://github.com/rosen-vladimirov/global-modules-path/releases/tag/v3.0.0 - Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
Summary |
|
07 Nov 2023, 03:43
Type | Values Removed | Values Added |
---|---|---|
Summary | Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function. |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2023-01-13 05:15
Updated : 2024-11-21 06:44
NVD link : CVE-2022-21191
Mitre link : CVE-2022-21191
CVE.ORG link : CVE-2022-21191
JSON object : View
Products Affected
global-modules-path_project
- global-modules-path
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-Other