Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0841

Опубликовано: 03 мар. 2022
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

OS Command Injection in GitHub repository ljharb/npm-lockfile in v2.0.3 and v2.0.4.

A flaw was found in npm-lockfile, where npm-lockfile v2 did not sanitize the only parameter before invoking sensitive command execution API with the input. This issue leads to a command injection vulnerability.

Отчет

This flaw only affects npm-lockfile v2. Red Hat Enterprise Linux is not affected by this issue as it ships npm-lockfile v1. Note that the impact is Low as there is no way for external attackers to provide unsafe input and exploit the issue. See huntr vulnerability report (External References) for more information in this regard.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8389-ds:1.4/389-ds-baseNot affected
Red Hat Enterprise Linux 8cockpitNot affected
Red Hat Enterprise Linux 8cockpit-appstreamNot affected
Red Hat Enterprise Linux 8container-tools:2.0/cockpit-podmanNot affected
Red Hat Enterprise Linux 8container-tools:rhel8/cockpit-podmanNot affected
Red Hat Enterprise Linux 8nodejs:12/nodejsNot affected
Red Hat Enterprise Linux 8nodejs:14/nodejsNot affected
Red Hat Software Collectionsrh-nodejs12-nodejsNot affected
Red Hat Software Collectionsrh-nodejs14-nodejsNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2060615npm-lockfile: os command injection

EPSS

Процентиль: 64%
0.00461
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

OS Command Injection in GitHub repository ljharb/npm-lockfile in v2.0.3 and v2.0.4.

CVSS3: 9.8
github
почти 4 года назад

OS Command injection in npm-lockfile

EPSS

Процентиль: 64%
0.00461
Низкий

5.3 Medium

CVSS3