This affects all versions of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require(\'../server/getJsonByCurl\')(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, \'\', _data.interfaceUrl, query, _data.cookie,_data.interfaceType);
Metrics
CVSS Version: 3.1 |
Base Score: 9.8 CRITICAL Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C