All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 | Exploit Third Party Advisory |
https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 | Broken Link |
Configurations
Information
Published : 2023-01-26 13:15
Updated : 2023-02-01 08:17
NVD link : CVE-2022-21810
Mitre link : CVE-2022-21810
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
smartctl_project
- smartctl