Command Injection in Tryton - CVE-2014-6633
Published: April 12, 2018 / Updated: August 10, 2020
Tryton
Detailed vulnerability description
The vulnerability allows a remote authenticated user to execute arbitrary code.
The safe_eval function in trytond in Tryton before 2.4.15, 2.6.x before 2.6.14, 2.8.x before 2.8.11, 3.0.x before 3.0.7, and 3.2.x before 3.2.3 allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the collection.domain in the webdav module or (2) the formula field in the price_list module.