Versions of the package network before 0.7.0 are vulnerable to Arbitrary Command Injection due to use of the child_process exec function without input sanitization. If (attacker-controlled) user input is given to the mac_address_for function of the package, it is possible for the attacker to execute arbitrary commands on the operating system that this package is being run on.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-06-17T21:29:18.642Z
Reserved: 2023-12-22T12:33:20.118Z
Link: CVE-2024-21488
Updated: 2025-06-17T21:22:45.039Z
Status : Modified
Published: 2024-01-30T05:15:09.277
Modified: 2024-11-21T08:54:32.133
Link: CVE-2024-21488
No data.