Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: snyk
Published: 2024-01-30T05:00:01.547Z
Updated: 2024-11-12T14:50:44.356Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21488
Vulnrichment
No data.
NVD
Status : Modified
Published: 2024-01-30T05:15:09.277
Modified: 2024-02-08T13:15:09.700
Link: CVE-2024-21488
Redhat
No data.