CVE-2014-6633

The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:14

Type Values Removed Values Added
References () http://www.tryton.org/posts/security-release-for-issue4155.html - Vendor Advisory () http://www.tryton.org/posts/security-release-for-issue4155.html - Vendor Advisory
References () https://bugs.tryton.org/issue4155 - Issue Tracking () https://bugs.tryton.org/issue4155 - Issue Tracking

Information

Published : 2018-04-12 15:29

Updated : 2024-11-21 02:14


NVD link : CVE-2014-6633

Mitre link : CVE-2014-6633

CVE.ORG link : CVE-2014-6633


JSON object : View

Products Affected

tryton

  • tryton
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')