GHSA-8vw3-vxmj-h43w

Suggest an improvement
Source
https://github.com/advisories/GHSA-8vw3-vxmj-h43w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-8vw3-vxmj-h43w/GHSA-8vw3-vxmj-h43w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8vw3-vxmj-h43w
Aliases
  • CVE-2023-26129
Published
2023-05-27T06:30:41Z
Modified
2025-01-14T15:52:14Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
bwm-ng vulnerable to command injection
Details

All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file.

Note:

To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-77",
        "CWE-78"
    ],
    "github_reviewed_at": "2023-05-30T20:07:24Z",
    "nvd_published_at": "2023-05-27T05:15:09Z",
    "severity": "HIGH"
}
References

Affected packages

npm / bwm-ng

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.1.1