Description
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91
https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808
Related Vulnerabilities
CVE-2023-25827 Vulnerability in maven package net.opentsdb:opentsdb
CVE-2022-39312 Vulnerability in maven package io.dataease:dataease-plugin-common
CVE-2020-7740 Vulnerability in npm package node-pdf-generator
CVE-2020-28481 Vulnerability in npm package socket.io
CVE-2011-4838 Vulnerability in maven package org.jruby:jruby