Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-01-30T05:00:01.547Z

Updated: 2024-11-12T14:50:44.356Z

Reserved: 2023-12-22T12:33:20.118Z

Link: CVE-2024-21488

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2024-01-30T05:15:09.277

Modified: 2024-02-08T13:15:09.700

Link: CVE-2024-21488

cve-icon Redhat

No data.