CVE-2014-6633: Tryton vulnerable to arbitrary command execution
(updated )
The safe_eval
function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain
in the webdav module or (2) the formula field in the price_list
module.
References
- bugs.tryton.org/issue4155
- github.com/advisories/GHSA-m9jj-5qvj-5fhx
- github.com/pypa/advisory-database/tree/main/vulns/trytond/PYSEC-2018-59.yaml
- github.com/tryton/trytond
- github.com/tryton/trytond/commit/19fc2a01357b7638041953326e404f51d96fad06
- github.com/tryton/trytond/commit/3e4c2b7e8c7b3358597a0d484fa98f45483ee92a
- nvd.nist.gov/vuln/detail/CVE-2014-6633
Detect and mitigate CVE-2014-6633 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →