CVE-2026-33310

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
Configurations

Configuration 1 (hide)

cpe:2.3:a:intake:intake:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-24 14:16

Updated : 2026-03-25 20:54


NVD link : CVE-2026-33310

Mitre link : CVE-2026-33310

CVE.ORG link : CVE-2026-33310


JSON object : View

Products Affected

intake

  • intake
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')