Prisma is an open source ORM for Node.js & TypeScript. As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
References
Link | Resource |
---|---|
https://github.com/prisma/prisma/pull/6245 | Patch Third Party Advisory |
https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20210618-0003/ | Third Party Advisory |
Configurations
Information
Published : 2021-04-28 18:15
Updated : 2022-04-26 10:26
NVD link : CVE-2021-21414
Mitre link : CVE-2021-21414
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
prisma
- prisma