Описание
Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality
Ссылки
- Broken LinkThird Party Advisory
- ExploitThird Party Advisory
- Broken LinkThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:sandboxie-plus:sandboxie:5.26:*:*:*:*:*:*:*
EPSS
Процентиль: 74%
0.00803
Низкий
10 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 10
github
больше 3 лет назад
** DISPUTED ** Sandboxie 5.26 allows a Sandbox Escape via an "import os" statement, followed by os.system("cmd") or os.system("powershell"), within a .py file. NOTE: the vendor disputes this issue because the observed behavior is consistent with the product's intended functionality.
EPSS
Процентиль: 74%
0.00803
Низкий
10 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo