Description
serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.
Remediation
References
https://github.com/es128/serial-number/blob/master/index.js#L106
https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010
Related Vulnerabilities
CVE-2020-2206 Vulnerability in maven package org.jenkins-ci.plugins:vncrecorder
CVE-2022-25863 Vulnerability in npm package gatsby-plugin-mdx
CVE-2020-19698 Vulnerability in maven package org.webjars.npm:editor.md
CVE-2018-1337 Vulnerability in maven package org.apache.directory.api:api-ldap-client-api
CVE-2020-35211 Vulnerability in maven package io.atomix:atomix