Skip to content

Command Injection in Limdu

Low severity GitHub Reviewed Published Jun 15, 2020 in erelsgl/limdu • Updated Mar 31, 2023

Package

npm limdu (npm)

Affected versions

<= 0.9.4

Patched versions

0.9.5

Description

Impact

The trainBatch function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.

Patches

Patched in version 0.9.5.

Workarounds

Do not use trainBatch with classifiers that rely on shell execution, such as SVM Perf, SVM Linear or Adaboost

References

No

References

@erelsgl erelsgl published to erelsgl/limdu Jun 15, 2020
Reviewed Jun 17, 2020
Published to the GitHub Advisory Database Jun 22, 2020
Last updated Mar 31, 2023

Severity

Low
3.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2020-4066

GHSA ID

GHSA-77qv-gh6f-pgh4

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.