Description
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0859 | im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. |
Github GHSA |
GHSA-qfxv-qqvg-24pg | OS Command Injection in im-metadata |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:02.072Z
Reserved: 2019-04-03T00:00:00.000Z
Link: CVE-2019-10788
No data.
Status : Modified
Published: 2020-02-04T21:15:10.730
Modified: 2024-11-21T04:19:55.377
Link: CVE-2019-10788
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA