Description
All versions of curling.js are vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
Remediation
References
https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56
https://snyk.io/vuln/SNYK-JS-CURLING-546484
Related Vulnerabilities
CVE-2023-3691 Vulnerability in maven package org.webjars.npm:github-com-layui-layui
CVE-2023-47324 Vulnerability in maven package org.silverpeas.core:silverpeas-core-war
CVE-2023-38507 Vulnerability in npm package @strapi/plugin-users-permissions
CVE-2021-32623 Vulnerability in maven package org.opencastproject:opencast-kernel