Vulnerability Details : CVE-2022-25973
All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the kill function, due to missing sanitization of the port argument.
Exploit prediction scoring system (EPSS) score for CVE-2022-25973
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-25973
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
nvd@nist.gov |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
report@snyk.io |
CWE ids for CVE-2022-25973
-
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-25973
-
https://www.npmjs.com/package/mc-kill-port
mc-kill-port - npmProduct;Third Party Advisory
-
https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070
Arbitrary Command Execution in mc-kill-port | CVE-2022-25973 | SnykExploit;Third Party Advisory
Products affected by CVE-2022-25973
- cpe:2.3:a:mc-kill-port_project:mc-kill-port:*:*:*:*:*:node.js:*:*