im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0859 | im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. |
Github GHSA |
GHSA-qfxv-qqvg-24pg | OS Command Injection in im-metadata |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T22:32:02.072Z
Reserved: 2019-04-03T00:00:00
Link: CVE-2019-10788
No data.
Status : Modified
Published: 2020-02-04T21:15:10.730
Modified: 2024-11-21T04:19:55.377
Link: CVE-2019-10788
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA