CVE-2020-7613: Clamscan vulnerable to command injection
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.81979%
CWE
Published
5/24/2022
Updated
10/19/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
clamscan | npm | <= 1.2.0 | 1.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability was explicitly documented in the CVE description as occurring in the _is_clamav_binary function. The GitHub commit diff shows the fix changed from using cp_exec with a concatenated command string to using cp_execfile with separated command/arguments, a classic command injection mitigation pattern. The PoC demonstrates how controlling the scanner path parameter enables command injection through improper command string construction.