The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
References
Link | Resource |
---|---|
http://www.tryton.org/posts/security-release-for-issue4155.html | Vendor Advisory |
https://bugs.tryton.org/issue4155 | Issue Tracking |
http://www.tryton.org/posts/security-release-for-issue4155.html | Vendor Advisory |
https://bugs.tryton.org/issue4155 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.tryton.org/posts/security-release-for-issue4155.html - Vendor Advisory | |
References | () https://bugs.tryton.org/issue4155 - Issue Tracking |
Information
Published : 2018-04-12 15:29
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6633
Mitre link : CVE-2014-6633
CVE.ORG link : CVE-2014-6633
JSON object : View
Products Affected
tryton
- tryton
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')