漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Command Injection and Docker container escape allows root on host machine
Vulnerability Description
Flowsint is an open-source OSINT graph exploration tool designed for cybersecurity investigation, transparency, and verification. Flowsint allows a user to create investigations, which are used to manage sketches and analyses. Sketches have controllable graphs, which are comprised of nodes and relationships. The sketches contain information on an OSINT target (usernames, websites, etc) within these nodes and relationships. The nodes can have automated processes execute on them called 'transformers'. A remote attacker can create a sketch, then trigger the 'org_to_asn' transform on an organization node to execute arbitrary OS commands as root on the host machine via shell metacharacters and a docker container escape. Commit b52cbbb904c8013b74308d58af88bc7dbb1b055c appears to remove the code that causes this issue.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Flowsint 安全漏洞
Vulnerability Description
Flowsint是reconurge开源的一个开源情报图形化调查工具。 Flowsint存在安全漏洞,该漏洞源于org_to_asn转换器允许通过shell元字符和Docker容器逃逸执行任意OS命令,可能导致远程攻击者以root权限在主机上执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A