Description
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
Remediation
References
https://advisory.checkmarx.net/advisory/CX-2021-4811/
https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/src/index.ts#L211-L217
Related Vulnerabilities
CVE-2023-22578 Vulnerability in npm package @sequelize/core
CVE-2023-37959 Vulnerability in maven package org.jenkins-ci.plugins:sumologic-publisher
CVE-2021-21297 Vulnerability in npm package @node-red/editor-api
CVE-2021-32808 Vulnerability in maven package org.webjars.npm:ckeditor4
CVE-2018-16487 Vulnerability in npm package lodash._basemerge