cve/2019/CVE-2019-10788.md

18 lines
708 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-10788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10788)
![](https://img.shields.io/static/v1?label=Product&message=im-metadata&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen)
### Description
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184
#### Github
No PoCs found on GitHub currently.