CVE-2020-36642

A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.
References
Link Resource
https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02 Patch
https://github.com/trampgeek/jobe/issues/39 Issue Tracking Third Party Advisory
https://github.com/trampgeek/jobe/releases/tag/v1.7.0 Release Notes
https://vuldb.com/?ctiid.217553 Permissions Required Third Party Advisory
https://vuldb.com/?id.217553 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jobe_project:jobe:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-01-06 11:15

Updated : 2024-05-17 01:48


NVD link : CVE-2020-36642

Mitre link : CVE-2020-36642

CVE.ORG link : CVE-2020-36642


JSON object : View

Products Affected

jobe_project

  • jobe
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')