Description
pulverizr through 0.7.0 allows execution of arbitrary commands. Within "lib/job.js", the variable "filename" can be controlled by the attacker. This function uses the variable "filename" to construct the argument of the exec call without any sanitization. In order to successfully exploit this vulnerability, an attacker will need to create a new file with the same name as the attack command.
Remediation
References
https://snyk.io/vuln/SNYK-JS-PULVERIZR-560122
Related Vulnerabilities
CVE-2023-43256 Vulnerability in npm package gladys
CVE-2010-4172 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2022-43430 Vulnerability in maven package com.compuware.jenkins:compuware-topaz-for-total-test
CVE-2021-42767 Vulnerability in maven package org.neo4j.procedure:apoc
CVE-2014-3709 Vulnerability in maven package org.keycloak:keycloak-services