漏洞信息
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Conda Constructor Command Injection via Unsanitized User Input (Low)
漏洞描述信息
(conda) Constructor is a tool which allows constructing an installer for a collection of conda packages. Prior to version 3.11.3, shell installer scripts process the installation prefix (user_prefix) using an eval statement, which executes unsanitized user input as shell code. Although the script runs with user privileges (not root), an attacker could exploit this by injecting arbitrary commands through a malicious path during installation. Exploitation requires explicit user action. This issue has been patched in version 3.11.3.
CVSS信息
CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:N/I:N/A:N
漏洞类别
在命令中使用的特殊元素转义处理不恰当(命令注入)
漏洞标题
Conda Constructor 命令注入漏洞
漏洞描述信息
Conda Constructor是Conda开源的一个从conda包创建安装程序的工具。 Conda Constructor 3.11.3之前版本存在命令注入漏洞,该漏洞源于eval语句处理安装前缀时执行未清理的用户输入,可能导致执行任意命令。
CVSS信息
N/A
漏洞类别
命令注入