The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Command Injection vulnerabilities in an interactive lesson.
Start learningEither turn off the ffprobe
functionality or upgrade to (at least) version 0.5.0
, which address this issue by using execFile
instead of exec
.
The codem-transcode
package supports a feature (off by default) to interact with a local ffprobe
. When enabled, POST requests to /probe
trigger the execution of the local ffprobe
binary, with the provided parameters.
This execution is done using exec
, allowing piped requests, and therefore enabling remote command execution. Newer versions use execFile
instead, preventing such injection (though still giving attackers to whatever functionality ffprobe
supports, and any weaknesses in it).
Note that, by default, the package only listens for such requests from the local network interface, greatly reducing the likelihood of exploitation.