Description
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
Remediation
References
https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7
https://github.com/pillys/fs-path/pull/6
https://hackerone.com/reports/324491
Related Vulnerabilities
CVE-2021-26814 Vulnerability in npm package wazuh
CVE-2020-8203 Vulnerability in maven package org.webjars.bowergithub.lodash:lodash
CVE-2022-23616 Vulnerability in maven package org.xwiki.platform:xwiki-platform-administration-ui
CVE-2022-43431 Vulnerability in maven package com.compuware.jenkins:compuware-strobe-measurement
CVE-2023-46131 Vulnerability in maven package org.grails:grails-encoder