Skip to content

Command Injection in opencv

Low severity GitHub Reviewed Published Jun 4, 2019 to the GitHub Advisory Database • Updated Jan 9, 2023

Package

npm opencv (npm)

Affected versions

< 6.1.0

Patched versions

6.1.0

Description

Versions of opencvprior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.

Recommendation

Upgrade to version 6.1.0.

References

Reviewed Jun 4, 2019
Published to the GitHub Advisory Database Jun 4, 2019
Last updated Jan 9, 2023

Severity

Low

EPSS score

Weaknesses

Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Learn more on MITRE.

CVE ID

No known CVE

GHSA ID

GHSA-f698-m2v9-5fh3

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.