top of page
perceptive_background_267k.jpg

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary com…

Published:

31 March 2026 at 22:00:00

Alert date:

1 April 2026 at 17:02:06

Source:

nvd.nist.gov

Click to open the original link from this advisory

Cloud & Virtualization, Security Tools

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a critical sandbox escape vulnerability in bash tool handling. The vulnerability allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features like directory changes and relative paths. Attackers can exploit incomplete shell semantics modeling to read and modify files outside the sandbox boundary. The vulnerability enables arbitrary command execution through subprocess invocation with shell interpretation enabled. This represents a significant security flaw that undermines the sandbox security model.

Technical details

Mitigation steps:

Affected products:

ByteDance Deer-Flow

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page