Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-21191

Опубликовано: 13 янв. 2023
Источник: redhat
CVSS3: 9.8

Описание

Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function.

A flaw was found in global-modules-path. This issue may allow command injection via getPath due to missing input sanitization or other checks and sandboxes being employed to the getPath function.

Отчет

Red Hat Process Automation Manager and Red Hat Decision Manager, although they may have references to global-modules-path, are considered moderate as there is no usage of the getPath method. Also, the currently lifecycle of those products are considered out of support scope.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7global-modules-pathOut of support scope
Red Hat Process Automation 7global-modules-pathOut of support scope

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=2166721global-modules-path: Command Injection due to missing Input Sanitization

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.4
nvd
около 3 лет назад

Versions of the package global-modules-path before 3.0.0 are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the getPath function.

CVSS3: 9.8
github
около 3 лет назад

global-modules-path Command Injection vulnerability

9.8 Critical

CVSS3