Description
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
Remediation
References
https://advisory.checkmarx.net/advisory/CX-2021-4811/
https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/src/index.ts#L211-L217
Related Vulnerabilities
CVE-2022-31830 Vulnerability in npm package kityminder
CVE-2022-34298 Vulnerability in maven package org.openidentityplatform.openam:openam-auth-nt
CVE-2022-24613 Vulnerability in maven package com.drewnoakes:metadata-extractor
CVE-2020-28481 Vulnerability in npm package socket.io
CVE-2020-13942 Vulnerability in maven package org.apache.unomi:unomi-common