CVE-2011-4213

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.
Configurations

Configuration 1 (hide)

cpe:2.3:a:google:app_engine_python_sdk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://blog.watchfire.com/files/googleappenginesdk.pdf - Exploit () http://blog.watchfire.com/files/googleappenginesdk.pdf - Exploit
References () http://code.google.com/p/googleappengine/wiki/SdkReleaseNotes - Patch () http://code.google.com/p/googleappengine/wiki/SdkReleaseNotes - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/71062 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/71062 - VDB Entry

Information

Published : 2011-10-30 19:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4213

Mitre link : CVE-2011-4213

CVE.ORG link : CVE-2011-4213


JSON object : View

Products Affected

google

  • app_engine_python_sdk
CWE
CWE-264

Permissions, Privileges, and Access Controls