Description
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
Remediation
References
https://github.com/418sec/huntr/pull/102
https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482
https://snyk.io/vuln/SNYK-JS-MVERSION-573174
Related Vulnerabilities
CVE-2017-16113 Vulnerability in npm package parsejson
CVE-2020-26939 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on
CVE-2021-21267 Vulnerability in npm package schema-inspector
CVE-2020-7708 Vulnerability in npm package @irrelon/path
CVE-2023-36470 Vulnerability in maven package org.xwiki.platform:xwiki-platform-icon-default