CVE-2014-6633

The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*
cpe:2.3:a:tryton:tryton:*:*:*:*:*:*:*:*

Information

Published : 2018-04-12 08:29

Updated : 2018-05-22 10:45


NVD link : CVE-2014-6633

Mitre link : CVE-2014-6633


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

tryton

  • tryton