Description
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/naddeoa/onion-oled-js/blob/8a523645d2cc29130f98de661b742893773d760d/src/oled-exp.js%23L91
https://snyk.io/vuln/SNYK-JS-ONIONOLEDJS-1078808
Related Vulnerabilities
CVE-2022-4375 Vulnerability in maven package net.mingsoft:ms-mcms
CVE-2023-2968 Vulnerability in npm package proxy
CVE-2021-27850 Vulnerability in maven package org.apache.tapestry:tapestry-core
CVE-2011-4838 Vulnerability in maven package org.jruby:jruby-stdlib
CVE-2023-24057 Vulnerability in maven package ca.uhn.hapi.fhir:org.hl7.fhir.convertors