CVE-2021-23363

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-23363
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-23363.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-23363
Aliases
Related
  • SNYK-JS-KILLBYPORT-1078531
Published
2021-03-30T15:15:15Z
Modified
2025-01-08T10:42:03.919016Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.

References

Affected packages

Git / github.com/guymograbi/kill-by-port

Affected ranges

Type
GIT
Repo
https://github.com/guymograbi/kill-by-port
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.0.1