top of page
perceptive_background_267k.jpg

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a sandbox escape vulnerability in bash tool handling that allows attackers to execute arbitrary com…

Published:

31 maart 2026 om 22:00:00

Alert date:

1 april 2026 om 17:02:06

Source:

nvd.nist.gov

Click to open the original link from this advisory

Cloud & Virtualization, Security Tools

ByteDance Deer-Flow versions prior to commit 92c7a20 contain a critical sandbox escape vulnerability in bash tool handling. The vulnerability allows attackers to execute arbitrary commands on the host system by bypassing regex-based validation using shell features like directory changes and relative paths. Attackers can exploit incomplete shell semantics modeling to read and modify files outside the sandbox boundary. The vulnerability enables arbitrary command execution through subprocess invocation with shell interpretation enabled. This represents a significant security flaw that undermines the sandbox security model.

Technical details

Mitigation steps:

Affected products:

ByteDance Deer-Flow

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page