Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
UAC < 3.3.0-rc1 Command Injection via Placeholder Substitution
Vulnerability Description
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval without proper sanitization. Attackers can inject shell metacharacters or command substitutions through attacker-controlled inputs including %line% values from foreach iterators and %user% / %user_home% values derived from system files to achieve arbitrary command execution with the privileges of the UAC process.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
uac 操作系统命令注入漏洞
Vulnerability Description
uac是Thiago Canozzo Lahr个人开发者的一个Unix系统取证与事件响应工具。 UAC 3.3.0-rc1之前版本存在操作系统命令注入漏洞,该漏洞源于_run_command()函数将构建的命令字符串直接传递给eval而未进行适当清理,可能导致通过攻击者控制的输入注入shell元字符或命令替换,从而执行任意命令。
CVSS Information
N/A
Vulnerability Type
N/A