Description
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
Remediation
References
https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7
https://github.com/pillys/fs-path/pull/6
https://hackerone.com/reports/324491
Related Vulnerabilities
CVE-2020-26291 Vulnerability in maven package org.webjars.bower:urijs
CVE-2021-3820 Vulnerability in npm package i
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-hbase_2-client-service
CVE-2022-22984 Vulnerability in npm package snyk-docker-plugin
CVE-2022-31198 Vulnerability in maven package org.webjars.npm:openzeppelin__contracts-upgradeable