An issue was discovered in SageMath Sage Cell Server through 2019-10-05. Python Code Injection can occur in the context of an internet facing web application. Malicious actors can execute arbitrary commands on the underlying operating system, as demonstrated by an __import__('os').popen('whoami').read() line. NOTE: the vendor's position is that the product is "vulnerable by design" and the current behavior will be retained
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/sagemath/sagecell/commits/master | patch |
https://sethsec.blogspot.com/2016/11/exploiting-python-code-injection-in-web.html | third party advisory exploit |
https://gist.github.com/barrett092/0380a1c34c014e29b827d1f408381525 | third party advisory exploit |