Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
JunoClaw: plugin-shell shell-metacharacter injection via shell wrapper
Vulnerability Description
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell metacharacters in agent-supplied arguments to be interpreted as command syntax. This vulnerability is fixed in 0.x.y-security-1.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Vulnerability Title
JunoClaw 命令注入漏洞
Vulnerability Description
JunoClaw是Dragonmonk111个人开发者的一个基于区块链的去中心化AI代理平台。 JunoClaw 0.x.y-security-1之前版本存在命令注入漏洞,该漏洞源于plugin-shell的run_command将代理提供的命令包装在shell中执行,可能导致shell元字符被解释为命令语法。
CVSS Information
N/A
Vulnerability Type
N/A