Vulnerability Description
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stoqey | Gnuplot | <= 0.0.3 |
References
- https://advisory.checkmarx.net/advisory/CX-2021-4811/ExploitThird Party Advisory
- https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/Exploit
- https://advisory.checkmarx.net/advisory/CX-2021-4811/ExploitThird Party Advisory
- https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/Exploit
FAQ
What is CVE-2021-33360?
CVE-2021-33360 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
How severe is CVE-2021-33360?
CVE-2021-33360 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-33360?
Check the references section above for vendor advisories and patch information. Affected products include: Stoqey Gnuplot.