Description
This affects all versions of package picotts. If attacker-controlled user input is given to the say function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/luisivan/node-picotts/blob/8c6b183b884890c8e9422f93036b374942398c8b/index.js%23L16
https://snyk.io/vuln/SNYK-JS-PICOTTS-1078539
Related Vulnerabilities
CVE-2022-40929 Vulnerability in maven package com.xuxueli:xxl-job-core
CVE-2023-40573 Vulnerability in maven package org.xwiki.platform:xwiki-platform-scheduler-api
CVE-2020-27665 Vulnerability in npm package strapi-plugin-content-type-builder
CVE-2022-28220 Vulnerability in maven package org.apache.james.protocols:protocols-netty
CVE-2022-43441 Vulnerability in maven package org.webjars.npm:sqlite3