漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in the Thermo Fisher Torrent Suite Django application 5.18.1. A remote code execution vulnerability exists in the network configuration functionality, stemming from insufficient input validation when processing network configuration parameters through administrative endpoints. The application allows administrators to modify the server's network configuration through the Django application. This configuration is processed by Bash scripts (TSsetnoproxy and TSsetproxy) that write user-controlled data directly to environment variables without proper sanitization. After updating environment variables, the scripts execute a source command on /etc/environment; if an attacker injects malicious data into environment variables, this command can enable arbitrary command execution. The vulnerability begins with the /admin/network endpoint, which passes user-supplied form data as arguments to subprocess.Popen calls. The user-supplied input is then used to update environment variables in TSsetnoproxy and TSsetproxy, and finally source $environment is executed.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Thermo Fisher Torrent Suite Django application 安全漏洞
Vulnerability Description
Thermo Fisher Torrent Suite Django application是美国Thermo Fisher公司的一个核心软件组件。 Thermo Fisher Torrent Suite Django application 5.18.1版本存在安全漏洞,该漏洞源于网络配置功能输入验证不足,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A