Lucene search

K
cve[email protected]CVE-2024-21488
HistoryJan 30, 2024 - 5:15 a.m.

CVE-2024-21488

2024-01-3005:15:09
CWE-77
web.nvd.nist.gov
36
cve-2024-21488
network
arbitrary command injection
vulnerability
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.

Affected configurations

NVD
Node
forkhqnetworkRange<0.7.0node.js
CPENameOperatorVersion
forkhq:networkforkhq networklt0.7.0

CNA Affected

[
  {
    "product": "network",
    "versions": [
      {
        "version": "0",
        "lessThan": "0.7.0",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "vendor": "n/a"
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

Related for CVE-2024-21488