ID |
CVE-2025-53927
|
Sažetak |
MaxKB is an open-source AI assistant for enterprise. Prior to version 2.0.0, the sandbox design rules can be bypassed because MaxKB only restricts the execution permissions of files in a specific directory. Therefore, an attacker can use the `shutil.copy2` method in Python to copy the command they want to execute to the executable directory. This bypasses directory restrictions and reverse shell. Version 2.0.0 fixes the issue. |
Reference |
|
CVSS |
Base: | 4.6 |
Impact: | 3.4 |
Exploitability: | 1.2 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
HIGH |
LOW |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
LOW |
LOW |
LOW |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L |
Zadnje važnije ažuriranje |
17-07-2025 - 21:15 |
Objavljeno |
17-07-2025 - 14:15 |