The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.
References
Link | Resource |
---|---|
https://bugs.tryton.org/issue4155 | Issue Tracking |
http://www.tryton.org/posts/security-release-for-issue4155.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-04-12 08:29
Updated : 2018-05-22 10:45
NVD link : CVE-2014-6633
Mitre link : CVE-2014-6633
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
tryton
- tryton