{ "schema_version": "1.4.0", "id": "GHSA-f698-m2v9-5fh3", "modified": "2020-08-31T18:35:50Z", "published": "2019-06-04T20:11:44Z", "aliases": [], "summary": "Command Injection in opencv", "details": "Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.\n\n\n## Recommendation\n\nUpgrade to version 6.1.0.\n", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "opencv" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "6.1.0" } ] } ] } ], "references": [ { "type": "WEB", "url": "https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/789" } ], "database_specific": { "cwe_ids": [ "CWE-77" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2019-06-04T20:11:26Z", "nvd_published_at": null } }