Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rph7-j9qr-h8q8

Опубликовано: 28 нояб. 2017
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Potential Command Injection in codem-transcode

When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.

Mitigating Factors:

The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default.

Recommendation

An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade..

Пакеты

Наименование

codem-transcode

npm
Затронутые версииВерсия исправления

< 0.5.0

0.5.0

EPSS

Процентиль: 79%
0.01272
Низкий

8.1 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 8 лет назад

The codem-transcode module before 0.5.0 for Node.js, when ffprobe is enabled, allows remote attackers to execute arbitrary commands via a POST request to /probe.

CVSS3: 8.1
nvd
больше 8 лет назад

The codem-transcode module before 0.5.0 for Node.js, when ffprobe is enabled, allows remote attackers to execute arbitrary commands via a POST request to /probe.

EPSS

Процентиль: 79%
0.01272
Низкий

8.1 High

CVSS3

Дефекты

CWE-77