CVE-2023-40582

find-exec is a utility to discover available shell commands. Versions prior to 1.0.3 did not properly escape user input and are vulnerable to Command Injection via an attacker controlled parameter. As a result, attackers may run malicious shell commands in the context of the running process. This issue has been addressed in version 1.0.3. users are advised to upgrade. Users unable to upgrade should ensure that all input passed to find-exec comes from a trusted source.
Configurations

Configuration 1 (hide)

cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 08:19

Type Values Removed Values Added
References () https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c - Patch () https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c - Patch
References () https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622 - Vendor Advisory () https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622 - Vendor Advisory

05 Sep 2023, 12:57

Type Values Removed Values Added
References (MISC) https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c - (MISC) https://github.com/shime/find-exec/commit/74fb108097c229b03d6dba4cce81e36aa364b51c - Patch
References (MISC) https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622 - (MISC) https://github.com/shime/find-exec/security/advisories/GHSA-95rp-6gqp-6622 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:find-exec_project:find-exec:*:*:*:*:*:node.js:*:*
First Time Find-exec Project
Find-exec Project find-exec

30 Aug 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-30 18:15

Updated : 2024-11-21 08:19


NVD link : CVE-2023-40582

Mitre link : CVE-2023-40582

CVE.ORG link : CVE-2023-40582


JSON object : View

Products Affected

find-exec_project

  • find-exec
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')