Description
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
Remediation
References
https://github.com/418sec/huntr/pull/102
https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482
https://snyk.io/vuln/SNYK-JS-MVERSION-573174
Related Vulnerabilities
CVE-2017-16195 Vulnerability in npm package pytservce
CVE-2022-44310 Vulnerability in npm package ecdh
CVE-2022-29244 Vulnerability in maven package org.webjars.npm:npm
CVE-2021-44550 Vulnerability in maven package edu.stanford.nlp:stanford-corenlp
CVE-2022-36099 Vulnerability in maven package org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki