[原文]Eval injection vulnerability in Karrigell before 2.1.8 allows remote attackers to execute arbitrary Python code via modified arguments to a Karrigell services (.ks) script, which can reference functions from libraries that are used by that script.
Karrigell contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to Karrigell scripts not properly sanitizing user input, exposing functions imported from other Karrigell scripts and python built-in functions. This may allow an attacker to construct a URL containing arbitrary commands which will be executed by the vulnerable script.
Upgrade to version 2.1.8 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.