Lucene search

K
githubGitHub Advisory DatabaseGHSA-VVH2-82C7-PPFG
HistoryJan 30, 2024 - 6:30 a.m.

network Arbitrary Command Injection vulnerability

2024-01-3006:30:23
CWE-77
GitHub Advisory Database
github.com
5
vulnerability
package
network
command execution
input sanitization
mac address

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for an attacker to execute arbitrary commands on the operating system that this package is being run on.

Affected configurations

Vulners
Node
networkRange<0.7.0
CPENameOperatorVersion
networklt0.7.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

Related for GHSA-VVH2-82C7-PPFG