Описание
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
Ссылки
- ExploitThird Party Advisory
- Release NotesThird Party Advisory
- ExploitThird Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.8.1 (включая)
cpe:2.3:a:mitre:caldera:*:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.10288
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-74
Связанные уязвимости
CVSS3: 8.8
github
около 4 лет назад
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
EPSS
Процентиль: 93%
0.10288
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-74