Untriaged
Permalink
CVE-2026-33310
8.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Intake has a Command Injection via shell() Expansion in Parameter Defaults
Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
References
-
https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 x_refsource_CONFIRM
Affected products
intake
- ==< 2.0.9
Matching in nixpkgs
pkgs.python312Packages.intake
Data load and catalog system
pkgs.python313Packages.intake
Data load and catalog system
pkgs.python314Packages.intake
Data load and catalog system
pkgs.python312Packages.intake-parquet
Parquet plugin for Intake
pkgs.python313Packages.intake-parquet
Parquet plugin for Intake
pkgs.python314Packages.intake-parquet
Parquet plugin for Intake
Package maintainers
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>