Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://github.com/es128/serial-number/blob/master/index.js#L106
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
Related Vulnerabilities
CVE-2022-25854 Vulnerability in npm package @yaireo/tagify
CVE-2022-31198 Vulnerability in maven package org.webjars.npm:openzeppelin__contracts-upgradeable
CVE-2015-7520 Vulnerability in maven package org.apache.wicket:wicket-core
CVE-2019-9142 Vulnerability in maven package org.b3log:symphony
CVE-2020-7677 Vulnerability in maven package org.webjars.npm:thenify