Vulnerability Description
clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Clamscan Project | Clamscan | <= 1.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/kylefarris/clamscan/blob/master/index.js#L34Third Party Advisory
- https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113ExploitThird Party Advisory
- https://github.com/kylefarris/clamscan/blob/master/index.js#L34Third Party Advisory
- https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113ExploitThird Party Advisory
FAQ
What is CVE-2020-7613?
CVE-2020-7613 is a vulnerability with a CVSS score of 8.1 (HIGH). clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that th...
How severe is CVE-2020-7613?
CVE-2020-7613 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-7613?
Check the references section above for vendor advisories and patch information. Affected products include: Clamscan Project Clamscan.