An issue was discovered in CALDERA 2.8.1. When activated,...
High severity
Unreviewed
Published
Jan 13, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jan 12, 2022
Published to the GitHub Advisory Database
Jan 13, 2022
Last updated
Jan 27, 2023
An issue was discovered in CALDERA 2.8.1. When activated, the Human plugin passes the unsanitized name parameter to a python "os.system" function. This allows attackers to use shell metacharacters (e.g., backticks "``" or dollar parenthesis "$()" ) in order to escape the current command and execute arbitrary shell commands.
References