inclusionAI AWorld har 8c257626e648d98d793dd9a1a950c2af4dd84c4e shell_tool.py subprocess.run/subprocess.Popen kura hakki ndiyam

Hakika vulnerability da aka rarraba a matsayin kura an gano a inclusionAI AWorld har 8c257626e648d98d793dd9a1a950c2af4dd84c4e. Tabbas, aikin subprocess.run/subprocess.Popen ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil AWorld/aworld/virtual_environments/terminals/shell_tool.py, a cikin sashi $software_component. Wuro manipulation ga kura hakki ndiyam. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-78. Lalle, rauni an sanar da shi 04/28/2025 tare da StarMap Team of Legendsec at QI-ANXIN Group da 38. Ana samun bayanin tsaro don saukewa a github.com. Ana kiran wannan rauni da CVE-2025-4032. Ngam yiɗi ka a tuma ndiyam ka nder waya. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a github.com. 0-day ga, an ndiyam a wuro be $0-$5k. Ana amfani da rolling release a wannan kayi domin ci gaba da isar da sabuntawa. Saboda haka, babu bayanan sigar da abin ya shafa ko sabunta sigar da ake da su. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 Goyarwa · 117 Datenpunkte

FurɗeSúgá
04/28/2025 08:01
Gargadi 1/2
04/30/2025 11:12
Gargadi 2/2
05/10/2025 06:11
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_prLLL
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore4.64.64.6
cvss2_vuldb_tempscore4.14.14.1
cvss3_vuldb_basescore5.05.05.0
cvss3_vuldb_tempscore4.74.74.7
cvss3_meta_basescore5.05.06.0
cvss3_meta_tempscore4.74.75.9
cvss4_vuldb_bscore2.32.32.3
cvss4_vuldb_btscore1.31.31.3
advisory_date1745791200 (04/28/2025)1745791200 (04/28/2025)1745791200 (04/28/2025)
price_0day$0-$5k$0-$5k$0-$5k
software_vendorinclusionAIinclusionAIinclusionAI
software_nameAWorldAWorldAWorld
software_version<=8c257626e648d98d793dd9a1a950c2af4dd84c4e<=8c257626e648d98d793dd9a1a950c2af4dd84c4e<=8c257626e648d98d793dd9a1a950c2af4dd84c4e
software_rollingrelease111
software_fileAWorld/aworld/virtual_environments/terminals/shell_tool.pyAWorld/aworld/virtual_environments/terminals/shell_tool.pyAWorld/aworld/virtual_environments/terminals/shell_tool.py
software_functionsubprocess.run/subprocess.Popensubprocess.run/subprocess.Popensubprocess.run/subprocess.Popen
vulnerability_cweCWE-78 (kura hakki ndiyam)CWE-78 (kura hakki ndiyam)CWE-78 (kura hakki ndiyam)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acHHH
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_ePPP
cvss3_vuldb_rcCCC
advisory_identifier383838
advisory_urlhttps://github.com/inclusionAI/AWorld/issues/38https://github.com/inclusionAI/AWorld/issues/38https://github.com/inclusionAI/AWorld/issues/38
advisory_confirm_urlhttps://github.com/inclusionAI/AWorld/issues/38#issuecomment-2806190923https://github.com/inclusionAI/AWorld/issues/38#issuecomment-2806190923https://github.com/inclusionAI/AWorld/issues/38#issuecomment-2806190923
exploit_availability111
exploit_publicity111
exploit_urlhttps://github.com/inclusionAI/AWorld/issues/38#issue-2996574433https://github.com/inclusionAI/AWorld/issues/38#issue-2996574433https://github.com/inclusionAI/AWorld/issues/38#issue-2996574433
source_cveCVE-2025-4032CVE-2025-4032CVE-2025-4032
cna_responsibleVulDBVulDBVulDB
cvss2_vuldb_avNNN
cvss2_vuldb_acHHH
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcCCC
cvss4_vuldb_avNNN
cvss4_vuldb_acHHH
cvss4_vuldb_uiNNN
cvss4_vuldb_vcLLL
cvss4_vuldb_viLLL
cvss4_vuldb_vaLLL
cvss4_vuldb_ePPP
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
company_nameStarMap Team of Legendsec at QI-ANXIN GroupStarMap Team of Legendsec at QI-ANXIN Group
cve_nvd_summaryA vulnerability was found in inclusionAI AWorld up to 8c257626e648d98d793dd9a1a950c2af4dd84c4e. It has been rated as critical. This issue affects the function subprocess.run/subprocess.Popen of the file AWorld/aworld/virtual_environments/terminals/shell_tool.py. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
cve_nvd_summaryesSe encontró una vulnerabilidad en inclusionAI AWorld hasta 8c257626e648d98d793dd9a1a950c2af4dd84c4e. Se ha clasificado como crítica. Este problema afecta a la función subprocess.run/subprocess.Popen del archivo AWorld/aworld/virtual_environments/terminals/shell_tool.py. La manipulación provoca la inyección de comandos del sistema operativo. El ataque puede iniciarse remotamente. Es un ataque de complejidad bastante alta. Parece difícil de explotar. Se ha hecho público el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no hay información disponible sobre las versiones afectadas y no afectadas.
cvss4_cna_avN
cvss4_cna_acH
cvss4_cna_atN
cvss4_cna_prL
cvss4_cna_uiN
cvss4_cna_vcL
cvss4_cna_viL
cvss4_cna_vaL
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore2.3
cvss3_cna_avN
cvss3_cna_acH
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cvss3_cna_basescore5
cvss3_nvd_avN
cvss3_nvd_acH
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore8.1
cvss2_cna_avN
cvss2_cna_acH
cvss2_cna_auS
cvss2_cna_ciP
cvss2_cna_iiP
cvss2_cna_aiP
cvss2_cna_basescore4.6

Do you want to use VulDB in your project?

Use the official API to access entries easily!