cve/2019/CVE-2019-10788.md

19 lines
758 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-10788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10788)
![](https://img.shields.io/static/v1?label=Product&message=im-metadata&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen)
### Description
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184
2024-06-09 00:33:16 +00:00
- https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.