clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2654 clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
Github GHSA Github GHSA GHSA-5v25-xr56-phph Clamscan vulnerable to command injection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:33:19.958Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-07T14:15:14.217

Modified: 2024-11-21T05:37:28.403

Link: CVE-2020-7613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses