logo
DATABASE RESOURCES PRICING ABOUT US

Arbitrary command execution in roar-pidusage

Description

This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.


Affected Software


CPE Name Name Version
roar-pidusage 1.1.7

Related