Description
This affects all versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103
https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528
Related Vulnerabilities
CVE-2018-20595 Vulnerability in maven package org.hswebframework.web:hsweb-system-oauth2-client-web
CVE-2020-17480 Vulnerability in npm package tinymce
CVE-2018-20677 Vulnerability in maven package org.webjars.bowergithub.twbs:bootstrap
CVE-2020-7690 Vulnerability in maven package org.webjars.npm:jspdf
CVE-2021-44667 Vulnerability in maven package com.alibaba.nacos:nacos-common