Lucene search

K
cvelistSnykCVELIST:CVE-2024-21488
HistoryJan 30, 2024 - 5:00 a.m.

CVE-2024-21488

2024-01-3005:00:01
snyk
www.cve.org
cve-2024-21488
arbitrary command injection
input sanitization
child_process exec

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P

0.001 Low

EPSS

Percentile

29.4%

Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.

CNA Affected

[
  {
    "product": "network",
    "versions": [
      {
        "version": "0",
        "lessThan": "0.7.0",
        "status": "affected",
        "versionType": "semver"
      }
    ],
    "vendor": "n/a"
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P

0.001 Low

EPSS

Percentile

29.4%

Related for CVELIST:CVE-2024-21488