CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
16.3%
Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) vulnerability in openEuler aops-ceres on Linux allows Command Injection. This vulnerability is associated with program files ceres/function/util.Py.
This issue affects aops-ceres: from 1.3.0 through 1.4.1.
[
{
"collectionURL": "https://gitee.com/src-openeuler",
"defaultStatus": "unaffected",
"modules": [
"ceres"
],
"packageName": "aops-ceres",
"platforms": [
"Linux"
],
"product": "aops-ceres",
"programFiles": [
"https://gitee.com/openeuler/aops-ceres/blob/master/ceres/function/util.py"
],
"repo": "https://gitee.com/src-openeuler/aops-ceres",
"vendor": "openEuler",
"versions": [
{
"changes": [
{
"at": "261133e1d33ed24fedc775e426740dc749108310",
"status": "unaffected"
},
{
"at": "6aa4bd6c9e8cda79856343d9573170e85081a44d",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.4.1",
"status": "affected",
"version": "1.3.0",
"versionType": "git"
}
]
}
]