漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Emissary has a Command Injection via PLACE_NAME Configuration in Executrix
Vulnerability Description
Emissary is a P2P based data-driven workflow engine. Prior to 8.39.0, the Executrix utility class constructed shell commands by concatenating configuration-derived values — including the PLACE_NAME parameter — with insufficient sanitization. Only spaces were replaced with underscores, allowing shell metacharacters (;, |, $, `, (, ), etc.) to pass through into /bin/sh -c command execution. This vulnerability is fixed in 8.39.0.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Emissary 操作系统命令注入漏洞
Vulnerability Description
Emissary是National Security Agency开源的一个分布式 P2P 数据驱动工作流框架。 Emissary 8.39.0之前版本存在操作系统命令注入漏洞,该漏洞源于Executrix工具类构建shell命令时,对配置值(包括PLACE_NAME参数)的清理不足,仅将空格替换为下划线,导致shell元字符可通过,可能导致任意命令执行。
CVSS Information
N/A
Vulnerability Type
N/A