CVE-2020-7613 log

Source
Severity High
Remote No
Type Arbitrary command execution
Description
clamscan through 1.2.0 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the `_is_clamav_binary` function located within `Index.js`. It should be noted that this vulnerability requires a pre-requisite that a folder should be created with the same command that will be chained to execute. This lowers the risk of this issue.
Group Package Affected Fixed Severity Status Ticket
AVG-1168 clamav 0.102.1-1 0.102.3-1 High Fixed
References
https://nvd.nist.gov/vuln/detail/CVE-2020-7613
https://snyk.io/vuln/SNYK-JS-CLAMSCAN-564113
https://github.com/kylefarris/clamscan/blob/master/index.js#L34