Description
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/xudafeng/killing/blob/672ed164ccdd10c0a8fb93c5c6d2456f1dfab781/lib/killing.js%23L62
https://snyk.io/vuln/SNYK-JS-KILLING-1078532
Related Vulnerabilities
CVE-2022-24721 Vulnerability in maven package org.cometd.java:cometd-java-oort
CVE-2020-28502 Vulnerability in maven package org.webjars.npm:xmlhttprequest-ssl
CVE-2023-33546 Vulnerability in maven package org.codehaus.janino:janino-parent
CVE-2023-26110 Vulnerability in npm package node-bluetooth
CVE-2023-29514 Vulnerability in maven package org.xwiki.platform:xwiki-platform-administration-ui