Lucene search

K
githubGitHub Advisory DatabaseGHSA-XFXF-QW26-HR33
HistoryMay 06, 2021 - 3:55 p.m.

Arbitrary command execution in roar-pidusage

2021-05-0615:55:43
CWE-77
GitHub Advisory Database
github.com
22

0.001 Low

EPSS

Percentile

38.8%

This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.

CPENameOperatorVersion
roar-pidusagele1.1.7

0.001 Low

EPSS

Percentile

38.8%

Related for GHSA-XFXF-QW26-HR33