ID |
CVE-2021-23359
|
Sažetak |
This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success. |
Reference |
|
CVSS |
Base: | 6.5 |
Impact: | 6.4 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
12-07-2022 - 17:42 |
Objavljeno |
18-03-2021 - 13:15 |