The package p4 before 0.0.7 are vulnerable to Command Injection via the run() function due to improper input sanitization
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JS-P4-3167330 | Exploit Patch Third Party Advisory |
https://github.com/natelong/p4/blob/master/p4.js%23L12 | Broken Link Third Party Advisory |
https://github.com/natelong/p4/commit/ae42e251beabf67c00539ec0e1d7aa149ca445fb | Patch Third Party Advisory |
Configurations
Information
Published : 2022-12-19 21:15
Updated : 2022-12-29 10:43
NVD link : CVE-2022-25171
Mitre link : CVE-2022-25171
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
p4_project
- p4