Impact
The vulnerability allows the shell() syntax within parameter defaults of Intake catalog files to be automatically expanded during parsing. An attacker who can supply a malicious catalog can include a shell(<command>) expression that will run when the catalog source is accessed, resulting in arbitrary code execution on the host. The weakness aligns with command injection and dynamic code execution, as enumerated by the associated CWEs.
Affected Systems
All installations of the Intake data handling package prior to version 2.0.9 are affected. The problem originates in catalogs that use parameter defaults with the shell() keyword, so any user or process that loads such a catalog is at risk. The fix is limited to versions 2.0.9 and later, which default the getshell flag to False for all catalog entries.
Risk and Exploitability
The CVSS score of 8.8 marks the issue as high severity, indicating significant potential impact. The EPSS score below 1% suggests the likelihood of exploitation is currently low, and the vulnerability is not cataloged in the CISA Known Exploited Vulnerabilities list. However, if an attacker controls the catalog or can influence its content, the attack vector is straightforward: provide a malicious YAML file that is parsed by the Intake application, leading to local command execution on the host system."
OpenCVE Enrichment
Github GHSA