CVE-2022-21810

All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartctl_project:smartctl:*:*:*:*:*:*:*:*

History

01 Apr 2025, 15:15

Type Values Removed Values Added
References (MISC) https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 - Exploit, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-SMARTCTL-3175613 - Exploit, Third Party Advisory
References (MISC) https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 - Broken Link () https://github.com/baslr/node-smartctl/blob/f61266084d5b3e4baae9bd85f67ec4ec6a716736/index.js%23L18 - Broken Link

07 Nov 2023, 03:43

Type Values Removed Values Added
Summary All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization. All versions of the package smartctl are vulnerable to Command Injection via the info method due to improper input sanitization.

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-77 NVD-CWE-Other

Information

Published : 2023-01-26 21:15

Updated : 2025-04-01 15:15


NVD link : CVE-2022-21810

Mitre link : CVE-2022-21810


JSON object : View

Products Affected

smartctl_project

  • smartctl