clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T09:33:19.958Z

Reserved: 2020-01-21T00:00:00

Link: CVE-2020-7613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-07T14:15:14.217

Modified: 2024-11-21T05:37:28.403

Link: CVE-2020-7613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.