Tryton vulnerable to arbitrary command execution
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Nov 18, 2024
Description
Published by the National Vulnerability Database
Apr 12, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Apr 29, 2024
Last updated
Nov 18, 2024
The
safe_eval
function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) thecollection.domain
in the webdav module or (2) the formula field in theprice_list
module.References