CVE-2020-28435:
ffmpeg-sdk vulnerable to OS Command Injection
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2722%
CWE
Published
7/26/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
ffmpeg-sdk | npm | <= 0.0.5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly tied to line 9 in index.js, which corresponds to the exec() call within the execute function. This function accepts arbitrary command strings and executes them without sanitization, making it a direct OS command injection vector. Functions like clip() and parseAudio() that use execute() inherit this vulnerability when building their command strings with user-controlled parameters (e.g., inputFilePath/outputFilePath), but the root cause is the unsanitized exec() call in execute(). The PoC demonstrates exploitation via execute('touch JHU'), confirming this path.