All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.
References
Link | Resource |
---|---|
https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:43
Type | Values Removed | Values Added |
---|---|---|
Summary | All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2023-01-26 21:15
Updated : 2024-02-28 19:51
NVD link : CVE-2022-21810
Mitre link : CVE-2022-21810
CVE.ORG link : CVE-2022-21810
JSON object : View
Products Affected
smartctl_project
- smartctl
CWE
NVD-CWE-Other
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')