Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
textract through 2.5.0 is vulnerable to OS Command Injection via the file path parameter in multiple extractors. When processing files with malicious filenames, the filePath is passed directly to child_process.exec() in lib/extractors/doc.js, rtf.js, dxf.js, images.js, and lib/util.js with inadequate sanitization
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
textract 安全漏洞
Vulnerability Description
textract是David Bashford个人开发者的一个支持多种格式的文本提取工具。 textract 2.5.0及之前版本存在安全漏洞,该漏洞源于文件路径参数未经验证,可能导致OS命令注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A