CVE-2019-10788

im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dnt:im-metadata:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 04:19

Type Values Removed Values Added
References () https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639 - Patch, Third Party Advisory () https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639 - Patch, Third Party Advisory
References () https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184 - Exploit, Patch, Third Party Advisory

Information

Published : 2020-02-04 21:15

Updated : 2024-11-21 04:19


NVD link : CVE-2019-10788

Mitre link : CVE-2019-10788

CVE.ORG link : CVE-2019-10788


JSON object : View

Products Affected

dnt

  • im-metadata
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')