All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking shell.exec without sanitization nor parametrization while concatenating the current directory as part of the command string.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0896 | All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking shell.exec without sanitization nor parametrization while concatenating the current directory as part of the command string. |
Github GHSA |
GHSA-6722-xvq8-3254 | SketchSVG Arbitrary Code Injection vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 05 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-03-05T19:51:11.794Z
Reserved: 2023-02-20T10:28:48.921Z
Link: CVE-2023-26107
Updated: 2024-08-02T11:39:06.558Z
Status : Modified
Published: 2023-03-06T05:15:12.470
Modified: 2025-03-05T20:15:54.340
Link: CVE-2023-26107
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA