Command Injection Affecting adb-driver package, versions *
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
1.74% (89th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-ADBDRIVER-564430
- published 5 Apr 2020
- disclosed 5 Apr 2020
- credit JHU System Security Lab
Introduced: 5 Apr 2020
CVE-2020-7636 Open this link in a new tabHow to fix?
There is no fixed version for adb-driver
.
Overview
adb-driver is a Universal Android USB Driver.
Affected versions of this package are vulnerable to Command Injection.
The argument command
can be controlled by users without any sanitization.
PoC
var root = require("adb-driver");
root.execADBCommand(' & touch Song');
the injection point is located in line 26 of index file “build/AdbDriver.js”
CVSS Scores
version 3.1