The package cycle-import-check before 1.3.2 are vulnerable to Command Injection via the writeFileToTmpDirAndOpenIt function due to improper user-input sanitization.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Soontao/cycle-import-check/commit/1ca97b59df7e9c704471fcb4cf042ce76d7c9890 | Patch Third Party Advisory | 
| https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955 | Exploit Patch Third Party Advisory | 
| https://github.com/Soontao/cycle-import-check/commit/1ca97b59df7e9c704471fcb4cf042ce76d7c9890 | Patch Third Party Advisory | 
| https://security.snyk.io/vuln/SNYK-JS-CYCLEIMPORTCHECK-3157955 | Exploit Patch Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2022-12-14 05:15
Updated : 2025-04-17 19:15
NVD link : CVE-2022-24377
Mitre link : CVE-2022-24377
CVE.ORG link : CVE-2022-24377
JSON object : View
Products Affected
                cycle-import-check_project
- cycle-import-check
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
