An issue in tiagorlampert CHAOS before 1b451cf62582295b7225caf5a7b506f0bad56f6b and 24c9e109b5be34df7b2bce8368eae669c481ed5e allows a remote attacker to execute arbitrary code via the unsafe concatenation of the `filename` argument into the `buildStr` string without any sanitization or filtering.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/tiagorlampert/CHAOS(Go) | 0 | 0.0.0-20220716132853-b47438d36e3a | N/A |
CVSS Metrics