The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
References
Link | Resource |
---|---|
http://www.tryton.org/posts/security-release-for-issue4155.html | Vendor Advisory |
https://bugs.tryton.org/issue4155 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-04-12 15:29
Updated : 2018-05-22 17:45
NVD link : CVE-2014-6633
Mitre link : CVE-2014-6633
CVE.ORG link : CVE-2014-6633
JSON object : View
Products Affected
tryton
- tryton
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')