{ "schema_version": "1.4.0", "id": "GHSA-c6rx-gxqv-vr5j", "modified": "2025-03-27T23:31:52Z", "published": "2023-01-31T06:30:26Z", "aliases": [ "CVE-2022-21129" ], "summary": "nemo-appium vulnerable to OS Command Injection", "details": "Versions of the package nemo-appium before 0.0.9 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports.setup' function. \n\n**Note:** In order to exploit this vulnerability appium-running 0.1.3 has to be installed as one of nemo-appium dependencies.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "npm", "name": "nemo-appium" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.0.9" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21129" }, { "type": "WEB", "url": "https://github.com/paypal/nemo-appium/commit/aa271d36dd5c81baae3c43aa2616c84f0ee4195f" }, { "type": "PACKAGE", "url": "https://github.com/paypal/nemo-appium" }, { "type": "WEB", "url": "https://github.com/paypal/nemo-appium/blob/master/index.js%23L27" }, { "type": "WEB", "url": "https://security.snyk.io/vuln/SNYK-JS-NEMOAPPIUM-3183747" } ], "database_specific": { "cwe_ids": [ "CWE-77", "CWE-78" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2023-02-01T23:47:58Z", "nvd_published_at": "2023-01-31T05:15:00Z" } }