CVE-2020-28429

All versions of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
References
Link Resource
https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:geojson2kml_project:geojson2kml:*:*:*:*:*:node.js:*:*

History

26 Feb 2021, 22:50

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-77
References (CONFIRM) https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 - (CONFIRM) https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412 - Exploit, Third Party Advisory
CPE cpe:2.3:a:geojson2kml_project:geojson2kml:*:*:*:*:*:node.js:*:*

23 Feb 2021, 16:22

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-23 15:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-28429

Mitre link : CVE-2020-28429

CVE.ORG link : CVE-2020-28429


JSON object : View

Products Affected

geojson2kml_project

  • geojson2kml
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')