The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.
References
Link | Resource |
---|---|
https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332 | Patch Third Party Advisory |
https://github.com/scravy/node-macaddress/pull/20/ | Third Party Advisory |
https://github.com/scravy/node-macaddress/releases/tag/0.2.9 | Release Notes Patch Third Party Advisory |
https://news.ycombinator.com/item?id=17283394 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-07-10 12:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-13797
Mitre link : CVE-2018-13797
CVE.ORG link : CVE-2018-13797
JSON object : View
Products Affected
node-macaddress_project
- node-macaddress
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')