Description
All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
Remediation
References
https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56
https://snyk.io/vuln/SNYK-JS-CURLING-546484
Related Vulnerabilities
CVE-2018-1000136 Vulnerability in npm package electron
CVE-2022-3171 Vulnerability in maven package com.google.protobuf:protobuf-java
CVE-2023-26113 Vulnerability in npm package collection.js
CVE-2020-36185 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2020-28052 Vulnerability in maven package org.bouncycastle:bcprov-ext-jdk15on