Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
sbt: Source dependency feature (via crafted VCS URL) leads to arbitrary code execution on Windows
Vulnerability Description
sbt is a build tool for Scala, Java, and others. From version 0.9.5 to before version 1.12.7, on Windows, sbt uses Process("cmd", "/c", ...) to run VCS commands (git, hg, svn). The URI fragment (branch, tag, revision) is user-controlled via the build definition and passed to these commands without validation. Because cmd /c interprets &, |, and ; as command separators, a malicious fragment can execute arbitrary commands. This issue has been patched in version 1.12.7.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
sbt 操作系统命令注入漏洞
Vulnerability Description
sbt是sbt开源的一个适用于 Scala、Java 等的构建工具。 sbt 1.12.7之前版本存在操作系统命令注入漏洞,该漏洞源于未验证用户控制的URI片段,可能导致在Windows上执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A