Vulnerability Description
All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Curling Project | Curling | All versions |
Related Weaknesses (CWE)
References
- https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-CURLING-546484ExploitThird Party Advisory
- https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53ExploitThird Party Advisory
- https://snyk.io/vuln/SNYK-JS-CURLING-546484ExploitThird Party Advisory
FAQ
What is CVE-2019-10789?
CVE-2019-10789 is a vulnerability with a CVSS score of 9.8 (CRITICAL). All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
How severe is CVE-2019-10789?
CVE-2019-10789 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10789?
Check the references section above for vendor advisories and patch information. Affected products include: Curling Project Curling.