Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
NetBox 4.3.5 - 4.5.4 RCE via RenderTemplateMixin
Vulnerability Description
NetBox versions 4.3.5 through 4.5.4 contain a remote code execution vulnerability in the RenderTemplateMixin.get_environment_params() method that allows authenticated users with exporttemplate or configtemplate permissions to execute arbitrary code by specifying malicious Python callables in the environment_params field. Attackers can bypass Jinja2 SandboxedEnvironment protections by setting the finalize parameter to any importable Python callable such as subprocess.getoutput, which is invoked on every rendered expression outside the sandbox's call interception mechanism, achieving remote code execution as the NetBox service user.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
宽松定义的白名单
Vulnerability Title
NetBox 安全漏洞
Vulnerability Description
NetBox是NetBox社区的一款基于Django、PostgreSql 用于IP地址管理(IPAM)和数据中心基础结构管理(DCIM)的工具。 NetBox 4.3.5版本至4.5.4版本存在安全漏洞,该漏洞源于RenderTemplateMixin.get_environment_params()方法中存在远程代码执行,允许具有exporttemplate或configtemplate权限的认证用户通过在environment_params字段中指定恶意Python可调用对象执行任意代码,攻击者可以
CVSS Information
N/A
Vulnerability Type
N/A