This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2021-04-18T18:45:21.360448Z

Updated: 2024-09-16T16:23:56.215Z

Reserved: 2021-01-08T00:00:00

Link: CVE-2021-23380

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-04-18T19:15:12.873

Modified: 2022-06-28T14:11:45.273

Link: CVE-2021-23380

cve-icon Redhat

No data.