Lucene search

K
nodejsNeal PooleNODEJS:2
HistoryOct 17, 2015 - 7:41 p.m.

Potential Command Injection

2015-10-1719:41:46
Neal Poole
www.npmjs.com
17

0.004 Low

EPSS

Percentile

73.0%

Overview

When the ffprobe functionality is enabled on the server, HTTP POST requests can be made to /probe. These requests are passed to the ffprobe binary on the server. Through this HTTP endpoint it is possible to send a malformed source file name to ffprobe that results in arbitrary command execution.

Mitigating Factors:

The ffprobe functionality is not enabled by default. In addition, exploitation opportunities are limited in a standard configuration because the server binds to the local interface by default.

Recommendation

An updated and patched version of the module (version 0.5.0) is available via npm. Users who have enabled the ffprobe functionality are especially encouraged to upgrade…

References

GitHub Advisory

CPENameOperatorVersion
codem-transcodelt0.5.0

0.004 Low

EPSS

Percentile

73.0%