CVE-2024-27980

Updated: 2025-10-14 09:20:29.167297

Description:

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x 0.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Ubuntu 18.04 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:27
Ubuntu 18.04 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:45
Ubuntu 20.04 nodejs 20 0.0 Not Vulnerable 2025-12-02 16:36:31
Ubuntu 20.04 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:20
Ubuntu 20.04 nodejs 14 0.0 Not Vulnerable 2025-12-02 16:36:39
Ubuntu 20.04 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:26
Ubuntu 20.04 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:42
Ubuntu 22.04 nodejs 16 0.0 Not Vulnerable 2025-12-02 16:36:43
Ubuntu 22.04 nodejs 18 0.0 Not Vulnerable 2025-12-02 16:36:31
Ubuntu 22.04 nodejs 12 0.0 Not Vulnerable 2025-12-02 16:36:25
Total: 67