Lucene search

K
githubGitHub Advisory DatabaseGHSA-69F2-4375-QV9H
HistoryJan 26, 2023 - 9:30 p.m.

Command injection in smartctl

2023-01-2621:30:27
CWE-77
GitHub Advisory Database
github.com
12
smartctl
command injection
input sanitization

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.6%

All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.

Affected configurations

Vulners
Node
smartctl_projectsmartctlRange1.0.0
VendorProductVersionCPE
smartctl_projectsmartctl*cpe:2.3:a:smartctl_project:smartctl:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

28.6%

Related for GHSA-69F2-4375-QV9H