Versions of the package exec-local-bin before 1.2.0 are vulnerable to Command Injection via the theProcess() functionality due to improper user-input sanitization.
References
Link | Resource |
---|---|
https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9 | Broken Link |
https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 | Exploit Third Party Advisory |
https://github.com/saeedseyfi/exec-local-bin/blob/92db00bde9d6e2d83410849f898df12f075b73b0/index.js%23L9 | Broken Link |
https://github.com/saeedseyfi/exec-local-bin/commit/d425866375c85038133a6f79db2aac66c0a72624 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-EXECLOCALBIN-3157956 | Exploit Third Party Advisory |
Configurations
History
10 Apr 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
Information
Published : 2023-01-06 05:15
Updated : 2025-04-10 14:15
NVD link : CVE-2022-25923
Mitre link : CVE-2022-25923
CVE.ORG link : CVE-2022-25923
JSON object : View
Products Affected
exec-local-bin_project
- exec-local-bin
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-Other CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')