CVE-2022-24431:
abacus-ext-cmdline vulnerable to Command Injection
7.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.54105%
CWE
Published
12/21/2022
Updated
8/17/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
abacus-ext-cmdline | npm | <= 0.0.6-dev.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- Multiple authoritative sources (GitHub Advisory, NVD, Snyk) explicitly identify the execute function as the injection vector.
- The provided PoC demonstrates command injection via root.execute() with untrusted input containing shell operators (&).
- CWE-78 classification confirms this is a command injection vulnerability where user input flows directly to OS commands.
- While exact implementation details aren't available, the consistent function name across reports and PoC usage provides high confidence in this assessment.