Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-NETWORK-6184371 | exploit third party advisory |
https://gist.github.com/icemonster/282ab98fb68fc22aac7c576538f6369c | mitigation exploit third party advisory |
https://github.com/tomas/network/commit/72c523265940fe279eb0050d441522628f8988e5 | patch |
https://github.com/tomas/network/commit/6ec8713580938ab4666df2f2d0f3399891ed2ad7 | patch |
https://github.com/tomas/network/commit/5599ed6d6ff1571a5ccadea775430c131f381de7 | patch |