CVE-2019-10061: OS Command Injection in node-opencv
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.90748%
CWE
Published
10/12/2021
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
opencv | npm | < 6.1.0 | 6.1.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input validation in utils/find-opencv.js
where user-supplied arguments (process.argv[2]
) were directly used to build shell commands. The patch in commit 81a4b86 replaced the dynamic process.argv[2]
reference with a static flag selection, confirming the attack vector was through uncontrolled command flag parameters. The CWE-78 alignment and commit changes explicitly show command injection via user-controlled flag parameter.