Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-13797

Опубликовано: 11 июн. 2018
Источник: redhat
CVSS3: 9.8
EPSS Средний

Описание

The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.

A flaw was found in nodejs-macaddress. The module allows unsanitized input to an exec call which can lead to an arbitrary command injection flaw. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

Red Hat Quay uses the macaddress module, but only as a development dependency, not at runtime reducing the impact on that product to low.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-ui-rhel8Not affected
Red Hat Quay 3quay/quay-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1940750nodejs-macaddress: improper input validation leading to command injection

EPSS

Процентиль: 93%
0.11295
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.

CVSS3: 9.8
nvd
больше 7 лет назад

The macaddress module before 0.2.9 for Node.js is prone to an arbitrary command injection flaw, due to allowing unsanitized input to an exec (rather than execFile) call.

CVSS3: 9.8
debian
больше 7 лет назад

The macaddress module before 0.2.9 for Node.js is prone to an arbitrar ...

CVSS3: 9.8
github
больше 7 лет назад

Command Injection in macaddress

EPSS

Процентиль: 93%
0.11295
Средний

9.8 Critical

CVSS3