Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. Version 2.0.9 mitigates the issue by making getshell False by default everywhere.
References
| Link | Resource |
|---|---|
| https://github.com/intake/intake/commit/d0c0b6b57c1cb3f73880655ded4a9b0e18e1fd1b | Patch |
| https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 | Exploit Vendor Advisory |
Configurations
History
25 Mar 2026, 20:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/intake/intake/commit/d0c0b6b57c1cb3f73880655ded4a9b0e18e1fd1b - Patch | |
| References | () https://github.com/intake/intake/security/advisories/GHSA-37g4-qqqv-7m99 - Exploit, Vendor Advisory | |
| First Time |
Intake intake
Intake |
|
| CPE | cpe:2.3:a:intake:intake:*:*:*:*:*:*:*:* |
24 Mar 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-24 14:16
Updated : 2026-03-25 20:54
NVD link : CVE-2026-33310
Mitre link : CVE-2026-33310
CVE.ORG link : CVE-2026-33310
JSON object : View
Products Affected
intake
- intake
