Description
clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2654 | clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue. |
Github GHSA |
GHSA-5v25-xr56-phph | Clamscan vulnerable to command injection |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-08-04T09:33:19.958Z
Reserved: 2020-01-21T00:00:00.000Z
Link: CVE-2020-7613
No data.
Status : Modified
Published: 2020-04-07T14:15:14.217
Modified: 2024-11-21T05:37:28.403
Link: CVE-2020-7613
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA