Description
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Published: 2018-04-12
Score: 8.8 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-70-1 tryton-server security update
EUVD EUVD EUVD-2018-0143 The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Github GHSA Github GHSA GHSA-m9jj-5qvj-5fhx Tryton vulnerable to arbitrary command execution
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T12:24:35.619Z

Reserved: 2014-09-19T00:00:00.000Z

Link: CVE-2014-6633

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-12T15:29:00.287

Modified: 2024-11-21T02:14:50.687

Link: CVE-2014-6633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses