CVE-2022-21810

All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartctl_project:smartctl:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:45

Type Values Removed Values Added
References () https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 - Broken Link () https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 - Broken Link
References () https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 7.4

07 Nov 2023, 03:43

Type Values Removed Values Added
Summary All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-77 NVD-CWE-Other

Information

Published : 2023-01-26 21:15

Updated : 2024-11-21 06:45


NVD link : CVE-2022-21810

Mitre link : CVE-2022-21810

CVE.ORG link : CVE-2022-21810


JSON object : View

Products Affected

smartctl_project

  • smartctl
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

NVD-CWE-Other