Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function.
References
Link | Resource |
---|---|
https://github.com/lorenzomigliorero/npm-node-utils/blob/b55dd81c597db657c9751332bb2242403fd3e26b/index.js%23L186 | Broken Link Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-GLOBALMODULESPATH-3167973 | Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/releases/tag/v3.0.0 | Third Party Advisory |
https://github.com/rosen-vladimirov/global-modules-path/commit/edbdaff077ea0cf295b1469923c06bbccad3c180 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-12 21:15
Updated : 2023-01-19 23:12
NVD link : CVE-2022-21191
Mitre link : CVE-2022-21191
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
global-modules-path_project
- global-modules-path