The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-70-1 tryton-server security update
EUVD EUVD EUVD-2018-0143 The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Github GHSA Github GHSA GHSA-m9jj-5qvj-5fhx Tryton vulnerable to arbitrary command execution
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T12:24:35.619Z

Reserved: 2014-09-19T00:00:00

Link: CVE-2014-6633

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-04-12T15:29:00.287

Modified: 2024-11-21T02:14:50.687

Link: CVE-2014-6633

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.