GHSA-652h-xwhf-q4h6

Suggest an improvement
Source
https://github.com/advisories/GHSA-652h-xwhf-q4h6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-652h-xwhf-q4h6/GHSA-652h-xwhf-q4h6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-652h-xwhf-q4h6
Aliases
Published
2021-09-21T16:50:46Z
Modified
2024-02-12T15:03:29Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N CVSS Calculator
Summary
OS Command Injection in ssh2
Details

ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.

Database specific
{
    "nvd_published_at": "2021-09-20T20:15:00Z",
    "cwe_ids": [
        "CWE-78"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2021-09-21T14:50:54Z"
}
References

Affected packages

npm / ssh2

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0