First published: Tue Jan 24 2023(Updated: )
All versions of the package puppet-facter are vulnerable to Command Injection via the getFact function due to improper input sanitization.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Facter | ||
npm/puppet-facter | <=0.0.2 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-25350.
The severity of CVE-2022-25350 is high, with a CVSS score of 7.8.
The affected software is Helecloud Puppet-facter.
This vulnerability occurs due to improper input sanitization in the getFact function of puppet-facter.
Yes, you can find more information about this vulnerability at the following references: [link-1](https://github.com/olindata/node-puppet-facter/blob/f34bcc754325d71bb3b1b534804e53d6170f15f5/index.js%23L10), [link-2](https://security.snyk.io/vuln/SNYK-JS-PUPPETFACTER-3175616).