Command Injection Affecting adb-driver Open this link in a new tab package, versions *
Exploit Maturity
Proof of concept
Attack Complexity
High
Confidentiality
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JS-ADBDRIVER-564430
-
published
5 Apr 2020
-
disclosed
5 Apr 2020
-
credit
JHU System Security Lab
Introduced: 5 Apr 2020
CVE-2020-7636 Open this link in a new tabHow to fix?
There is no fixed version for adb-driver
.
Overview
adb-driver is a Universal Android USB Driver.
Affected versions of this package are vulnerable to Command Injection.
The argument command
can be controlled by users without any sanitization.
PoC
var root = require("adb-driver");
root.execADBCommand(' & touch Song');
the injection point is located in line 26 of index file “build/AdbDriver.js”