Описание
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 3.2.3-1 |
| cosmic | not-affected | 3.2.3-1 |
| devel | not-affected | 3.2.3-1 |
| disco | not-affected | 3.2.3-1 |
| esm-apps/bionic | not-affected | 3.2.3-1 |
| esm-apps/xenial | not-affected | 3.2.3-1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
Показывать по
EPSS
9 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x befor ...
Tryton vulnerable to arbitrary command execution
EPSS
9 Critical
CVSS2
8.8 High
CVSS3