Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
666ghj MiroFish Inter-Process Communication simulation_ipc.py SimulationIPCClient.send_command command injection
Vulnerability Description
A vulnerability has been found in 666ghj MiroFish up to 0.1.2. The impacted element is the function SimulationIPCClient.send_command of the file backend/app/services/simulation_ipc.py of the component Inter-Process Communication. Such manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Vulnerability Title
MiroFish 注入漏洞
Vulnerability Description
MiroFish是BaiFu个人开发者的一款群体智能预测引擎,用于模拟和推演未来。 MiroFish 0.1.2及之前版本存在注入漏洞,该漏洞源于Inter-Process Communication组件中backend/app/services/simulation_ipc.py文件的SimulationIPCClient.send_command函数存在命令注入。
CVSS Information
N/A
Vulnerability Type
N/A