Description
An issue found in Stoqey gnuplot v.0.0.3 and earlier allows attackers to execute arbitrary code via the src/index.ts, plotCallack, child_process, and/or filePath parameter(s).
Remediation
References
https://advisory.checkmarx.net/advisory/CX-2021-4811/
https://github.com/stoqey/gnuplot/blob/cd76060a15f58348baeef1c5fd867ce856515949/src/index.ts#L211-L217
Related Vulnerabilities
CVE-2023-46589 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2021-43138 Vulnerability in maven package org.webjars:async
CVE-2021-25915 Vulnerability in npm package changeset
CVE-2022-1243 Vulnerability in maven package org.webjars.npm:urijs
CVE-2020-7661 Vulnerability in maven package org.webjars.npm:url-regex