Command injection exists in pdf-image v2.0.0 due to an unescaped string parameter.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://hackerone.com/reports/340208 | third party advisory exploit |
https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83 | third party advisory patch |