Vulnerability Description
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ps-Visitor Project | Ps-Visitor | All versions |
Related Weaknesses (CWE)
References
- https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d0Broken Link
- https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544ExploitThird Party Advisory
- https://github.com/WisdomKwan/ps-visitor/blob/cdfc934a8e4af95aa0473f4b2a4bd091d0Broken Link
- https://snyk.io/vuln/SNYK-JS-PSVISITOR-1078544ExploitThird Party Advisory
FAQ
What is CVE-2021-23374?
CVE-2021-23374 is a vulnerability with a CVSS score of 7.3 (HIGH). This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of th...
How severe is CVE-2021-23374?
CVE-2021-23374 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-23374?
Check the references section above for vendor advisories and patch information. Affected products include: Ps-Visitor Project Ps-Visitor.