Description
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/xudafeng/killing/blob/672ed164ccdd10c0a8fb93c5c6d2456f1dfab781/lib/killing.js%23L62
https://snyk.io/vuln/SNYK-JS-KILLING-1078532
Related Vulnerabilities
CVE-2021-41862 Vulnerability in maven package com.googlecode.aviator:aviator
CVE-2019-10349 Vulnerability in maven package org.jenkins-ci.plugins:depgraph-view
CVE-2023-34093 Vulnerability in npm package @strapi/utils
CVE-2022-0722 Vulnerability in maven package org.webjars.npm:parse-url
CVE-2018-16487 Vulnerability in npm package lodash.mergewith