Vulnerability Description
This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Picotts Project | Picotts | All versions |
Related Weaknesses (CWE)
References
- https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942Broken Link
- https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539ExploitThird Party Advisory
- https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942Broken Link
- https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539ExploitThird Party Advisory
FAQ
What is CVE-2021-23378?
CVE-2021-23378 is a vulnerability with a CVSS score of 9.8 (CRITICAL). This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the ch...
How severe is CVE-2021-23378?
CVE-2021-23378 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-23378?
Check the references section above for vendor advisories and patch information. Affected products include: Picotts Project Picotts.