Vulnerability Description
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ronomon | Opened | < 1.5.2 |
Related Weaknesses (CWE)
References
- https://advisory.checkmarx.net/advisory/CX-2021-4775ExploitThird Party Advisory
- https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ePatchThird Party Advisory
- https://advisory.checkmarx.net/advisory/CX-2021-4775ExploitThird Party Advisory
- https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ePatchThird Party Advisory
FAQ
What is CVE-2021-29300?
CVE-2021-29300 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted...
How severe is CVE-2021-29300?
CVE-2021-29300 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-29300?
Check the references section above for vendor advisories and patch information. Affected products include: Ronomon Opened.