CVE-2022-25890

All versions of the package wifey are vulnerable to Command Injection via the connect() function due to improper input sanitization.
References
Link Resource
https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 Exploit Third Party Advisory
https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wifey_project:wifey:-:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
Summary
  • (es) Todas las versiones del paquete Wifey son vulnerables a la inyección de comandos a través de la función connect() debido a una sanitización de entrada inadecuada.
References () https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615 - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.4

07 Nov 2023, 03:44

Type Values Removed Values Added
Summary All versions of the package wifey are vulnerable to Command Injection via the connect() function due to improper input sanitization. All versions of the package wifey are vulnerable to Command Injection via the connect() function due to improper input sanitization.

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-77 NVD-CWE-Other

Information

Published : 2023-01-09 05:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-25890

Mitre link : CVE-2022-25890

CVE.ORG link : CVE-2022-25890


JSON object : View

Products Affected

wifey_project

  • wifey
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

NVD-CWE-Other