Описание
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
Ссылки
- https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639PatchThird Party Advisory
- ExploitPatchThird Party Advisory
- https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639PatchThird Party Advisory
- ExploitPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.0.1 (включая)
cpe:2.3:a:dnt:im-metadata:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 83%
0.01843
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-78
Связанные уязвимости
EPSS
Процентиль: 83%
0.01843
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-78