Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the theProcess() functionality due to improper user-input sanitization.
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 | Exploit Third Party Advisory |
https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9 | Broken Link |
https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-05 21:15
Updated : 2023-01-12 05:28
NVD link : CVE-2022-25923
Mitre link : CVE-2022-25923
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
exec-local-bin_project
- exec-local-bin