| Title | dst-admin dst-admin <= 1.5.0 Code Injection |
|---|
| Description | Multiple command injection vulnerabilities exist in dst-admin <= 1.5.0. The ShellService class contains several methods that construct shell commands by directly concatenating user-controlled input without any validation or sanitization. An attacker can inject arbitrary shell commands using command substitution syntax $() or backticks, which will be executed by /bin/sh -c before the main command runs. This can lead to complete server compromise, including arbitrary command execution and sensitive file access. |
|---|
| Source | ⚠️ https://fx4tqqfvdw4.feishu.cn/docx/ObYgdtoweowo8Vx4dmuckqC7nBe?from=from_copylink |
|---|
| User | xcxr (UID 86629) |
|---|
| Submission | 02/09/2026 07:41 (3 months ago) |
|---|
| Moderation | 02/22/2026 08:14 (13 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 347323 [qinming99 dst-admin up to 1.5.0 /home/restore revertBackup Name command injection] |
|---|
| Points | 20 |
|---|