This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528 | Exploit Third Party Advisory |
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103 | Broken Link |
Configurations
Information
Published : 2021-04-18 12:15
Updated : 2021-04-22 17:49
NVD link : CVE-2021-23380
Mitre link : CVE-2021-23380
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
roar-pidusage_project
- roar-pidusage