
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2019-10787 vulnerability affects im-resize through version 2.3.2, a Node.js package designed for efficient image resizing using ImageMagick's convert command. The vulnerability was discovered and disclosed on April 3, 2019, allowing remote attackers to execute arbitrary commands via the 'exec' argument (CVE-MITRE).
The vulnerability stems from insufficient input validation in the index.js file, where the cmd argument can be controlled by users without proper sanitization. This allows attackers to inject malicious commands that will be executed by the system (Snyk-Report). A proof-of-concept exploit demonstrates that an attacker can execute arbitrary system commands by manipulating the image path parameter (GitHub-Commit).
When successfully exploited, this vulnerability can lead to arbitrary command execution on the affected system, potentially resulting in complete system compromise. The vulnerability has a high severity rating due to its potential for remote code execution without requiring special privileges or user interaction (Snyk-Report).
A fix has been implemented in the master branch of the project that includes input validation to check for suspicious characters using regex patterns. The fix prevents the execution of commands containing potentially malicious characters such as semicolons, ampersands, backticks, dollar signs, and parentheses (GitHub-Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."