Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://github.com/es128/serial-number/blob/master/index.js#L106
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
Related Vulnerabilities
CVE-2018-16492 Vulnerability in npm package extend
CVE-2018-20843 Vulnerability in npm package dbus
CVE-2018-1270 Vulnerability in maven package org.springframework:spring-messaging
CVE-2020-7684 Vulnerability in npm package rollup-plugin-serve
CVE-2022-25842 Vulnerability in maven package com.alibaba.oneagent:one-java-agent-plugin