Miggo Logo

CVE-2019-10061: OS Command Injection in node-opencv

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.90748%
Published
10/12/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
opencvnpm< 6.1.06.1.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper input validation in utils/find-opencv.js where user-supplied arguments (process.argv[2]) were directly used to build shell commands. The patch in commit 81a4b86 replaced the dynamic process.argv[2] reference with a static flag selection, confirming the attack vector was through uncontrolled command flag parameters. The CWE-78 alignment and commit changes explicitly show command injection via user-controlled flag parameter.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

utils/*in*-op*n*v.js in no**-op*n*v (*k* Op*n*V *in*in*s *or No**.js) prior to *.*.* is vuln*r**l* to *omm*n* Inj**tion. It *o*s not v*li**t* us*r input *llowin* *tt**k*rs to *x**ut* *r*itr*ry *omm*n*s.

Reasoning

T** vuln*r**ility st*ms *rom improp*r input v*li**tion in `utils/*in*-op*n*v.js` w**r* us*r-suppli** *r*um*nts (`pro**ss.*r*v[*]`) w*r* *ir**tly us** to *uil* s**ll *omm*n*s. T** p*t** in *ommit ******* r*pl**** t** *yn*mi* `pro**ss.*r*v[*]` r***r*n*