codem-transcode@0.2.2 vulnerabilities

Offline video transcoding using ffmpeg, with a small HTTP API.

  • latest version

    0.5.11

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    9 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the codem-transcode package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Command Injection

    The codem-transcode package supports a feature (off by default) to interact with a local ffprobe. When enabled, POST requests to /probe trigger the execution of the local ffprobe binary, with the provided parameters.

    This execution is done using exec, allowing piped requests, and therefore enabling remote command execution. Newer versions use execFile instead, preventing such injection (though still giving attackers to whatever functionality ffprobe supports, and any weaknesses in it).

    Note that, by default, the package only listens for such requests from the local network interface, greatly reducing the likelihood of exploitation.

    How to fix Arbitrary Command Injection?

    Either turn off the ffprobe functionality or upgrade to (at least) version 0.5.0, which address this issue by using execFile instead of exec.

    <0.5.0