GHSA-549h-r7g9-2qpf

Suggest an improvement
Source
https://github.com/advisories/GHSA-549h-r7g9-2qpf
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-549h-r7g9-2qpf/GHSA-549h-r7g9-2qpf.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-549h-r7g9-2qpf
Aliases
  • CVE-2023-26127
Published
2023-05-27T06:30:41Z
Modified
2023-11-08T04:11:59.068798Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
n158 vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function
Details

All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function.

Note:

To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.

References

Affected packages

npm / n158

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.4.1