Description
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
Remediation
References
https://github.com/xudafeng/killing/blob/672ed164ccdd10c0a8fb93c5c6d2456f1dfab781/lib/killing.js%23L62
https://snyk.io/vuln/SNYK-JS-KILLING-1078532
Related Vulnerabilities
CVE-2021-32659 Vulnerability in npm package matrix-appservice-bridge
CVE-2022-36894 Vulnerability in maven package org.jenkins-ci.plugins:clif-performance-testing
CVE-2023-47323 Vulnerability in maven package org.silverpeas.core:silverpeas-core-web
CVE-2023-36542 Vulnerability in maven package org.apache.nifi:nifi-cdc-mysql-processors