Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
https://github.com/es128/serial-number/blob/master/index.js#L106
Related Vulnerabilities
CVE-2021-21347 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2021-21290 Vulnerability in maven package io.netty:netty-testsuite
CVE-2016-10735 Vulnerability in maven package org.webjars.bower:bootstrap-sass
CVE-2023-48711 Vulnerability in maven package org.webjars.npm:google-translate-api-browser
CVE-2023-37954 Vulnerability in maven package com.sonyericsson.hudson.plugins.rebuild:rebuild