Lucene search

K
githubGitHub Advisory DatabaseGHSA-M5V8-WPW4-RJ3X
HistoryDec 21, 2022 - 6:30 a.m.

abacus-ext-cmdline vulnerable to Command Injection

2022-12-2106:30:29
CWE-78
GitHub Advisory Database
github.com
7
abacus-ext-cmdline
command injection
user-input sanitization
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.018

Percentile

88.2%

All versions of package abacus-ext-cmdline are vulnerable to Command Injection via the execute function due to improper user-input sanitization.

Affected configurations

Vulners
Node
abacus-ext-cmdline_projectabacus-ext-cmdlineRange0.0.6-dev.9node.js
VendorProductVersionCPE
abacus-ext-cmdline_projectabacus-ext-cmdline*cpe:2.3:a:abacus-ext-cmdline_project:abacus-ext-cmdline:*:*:*:*:*:node.js:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.018

Percentile

88.2%

Related for GHSA-M5V8-WPW4-RJ3X