All versions of the package sketchsvg are vulnerable to Arbitrary Code Injection when invoking shell.exec without sanitization nor parametrization while concatenating the current directory as part of the command string.
References
Link | Resource |
---|---|
https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js%23L115 | Broken Link |
https://github.com/eBay/SketchSVG/blob/dd1036648f0f320a3187ef79d506b676b9eb87a6/lib/index.js%23L64 | Broken Link |
https://security.snyk.io/vuln/SNYK-JS-SKETCHSVG-3167969 | Exploit Third Party Advisory |
Configurations
History
10 Mar 2023, 22:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-06 05:15
Updated : 2024-02-04 23:14
NVD link : CVE-2023-26107
Mitre link : CVE-2023-26107
CVE.ORG link : CVE-2023-26107
JSON object : View
Products Affected
ebay
- sketchsvg
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')