Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process
exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for
function of the package, it is possible for an attacker to execute arbitrary commands on the operating system that this package is being run on.
{ "nvd_published_at": "2024-01-30T05:15:09Z", "cwe_ids": [ "CWE-77" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-01-30T18:43:05Z" }