
Cloud Vulnerability DB
A community-led vulnerabilities database
An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, which allows attackers to execute arbitrary code via the filePath parameter. This vulnerability was identified and disclosed in October 2020 (NVD, CVE).
The vulnerability exists in the command execution functionality within aaptjs/index.js, specifically on line 18. The application fails to properly restrict or sanitize arbitrary commands in user input, which can lead to command injection and subsequent remote code execution. The issue was initially reported through HackerOne (report #996483) (GitHub Issue).
The vulnerability allows attackers to execute arbitrary code on the affected system, which could lead to complete system compromise. This could potentially result in unauthorized access, information disclosure, or denial of service attacks.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."