Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://github.com/es128/serial-number/blob/master/index.js#L106
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
Related Vulnerabilities
CVE-2017-0783 Vulnerability in maven package org.apache.openmeetings:openmeetings-web
CVE-2017-16072 Vulnerability in npm package nodemailer.js
CVE-2020-27224 Vulnerability in npm package @theia/preview
CVE-2019-10434 Vulnerability in maven package com.mtvi.plateng.hudson:ldapemail
CVE-2023-48796 Vulnerability in maven package org.apache.dolphinscheduler:dolphinscheduler-api