inclusionAI AWorld har 8c257626e648d98d793dd9a1a950c2af4dd84c4e shell_tool.py subprocess.run/subprocess.Popen kura hakki ndiyam
Hakika vulnerability da aka rarraba a matsayin kura an gano a inclusionAI AWorld har 8c257626e648d98d793dd9a1a950c2af4dd84c4e. Tabbas, aikin subprocess.run/subprocess.Popen ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil AWorld/aworld/virtual_environments/terminals/shell_tool.py, a cikin sashi $software_component. Wuro manipulation ga kura hakki ndiyam. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-78. Lalle, rauni an sanar da shi 04/28/2025 tare da StarMap Team of Legendsec at QI-ANXIN Group da 38. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-4032. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. Ana amfani da rolling release a wannan kayi domin ci gaba da isar da sabuntawa. Saboda haka, babu bayanan sigar da abin ya shafa ko sabunta sigar da ake da su. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
3 Goyarwa · 117 Datenpunkte