CVE-2021-23360

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23360
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-23360.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-23360
Aliases
Published
2021-03-21T16:15:12Z
Modified
2024-05-30T02:56:36.227977Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.

References

Affected packages

Git / github.com/ssnau/killport

Affected ranges

Type
GIT
Repo
https://github.com/ssnau/killport
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed