CVE-2020-36642

A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability.
References
Link Resource
https://github.com/trampgeek/jobe/commit/8f43daf50c943b98eaf0c542da901a4a16e85b02 Patch
https://github.com/trampgeek/jobe/issues/39 Issue Tracking Third Party Advisory
https://github.com/trampgeek/jobe/releases/tag/v1.7.0 Release Notes
https://vuldb.com/?ctiid.217553 Permissions Required Third Party Advisory
https://vuldb.com/?id.217553 Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jobe_project:jobe:*:*:*:*:*:*:*:*

History

29 Feb 2024, 01:28

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad fue encontrada en trampgeek jobe hasta 1.6.x y clasificada como crítica. Este problema afecta la función run_in_sandbox del archivo application/libraries/LanguageTask.php. La manipulación conduce a la inyección de comandos. La actualización a la versión 1.7.0 puede solucionar este problema. El identificador del parche es 8f43daf50c943b98eaf0c542da901a4a16e85b02. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asignó el identificador VDB-217553.

Information

Published : 2023-01-06 11:15

Updated : 2024-05-17 01:48


NVD link : CVE-2020-36642

Mitre link : CVE-2020-36642

CVE.ORG link : CVE-2020-36642


JSON object : View

Products Affected

jobe_project

  • jobe
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')