S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-09-02 07:55
Updated : 2014-09-03 06:33
NVD link : CVE-2014-0485
Mitre link : CVE-2014-0485
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
s3ql_project
- s3ql