CVE-2020-28446: ntesseract vulnerable to Command Injection
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78376%
CWE
Published
7/26/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| ntesseract | npm | < 0.2.9 | 0.2.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The vulnerability is explicitly located in lib/tesseract.js according to all sources
- The GitHub patch shows modifications to the 'command' function in this file
- The pre-patch code directly interpolates user-controlled 'image' parameter into system command arguments without sanitization
- The fix adds quote wrapping attempts to mitigate injection (though imperfect)
- CWE-77 classification confirms this is a command injection vulnerability in command construction
- Snyk's PoC demonstrates exploitation through the process() method which likely calls this command function