GHSA-wjr4-2jgw-hmv8

Suggest an improvement
Source
https://github.com/advisories/GHSA-wjr4-2jgw-hmv8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-wjr4-2jgw-hmv8/GHSA-wjr4-2jgw-hmv8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wjr4-2jgw-hmv8
Aliases
  • CVE-2018-3772
Published
2018-07-31T18:28:53Z
Modified
2023-11-08T04:00:19.633112Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Command Injection in whereis
Details

Versions of whereis before 0.4.1 are vulnerable to command injection if untrusted user input is passed into whereis.

Recommendation

Update to version 0.4.1 or later.

Database specific
{
    "github_reviewed_at": "2020-06-16T22:00:43Z",
    "severity": "CRITICAL",
    "cwe_ids": [
        "CWE-77"
    ],
    "github_reviewed": true,
    "nvd_published_at": null
}
References

Affected packages

npm / whereis

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.1