S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2014/dsa-3013 - | |
References | () http://www.openwall.com/lists/oss-security/2014/08/28/3 - | |
References | () https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8 - Exploit, Patch |
Information
Published : 2014-09-02 14:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0485
Mitre link : CVE-2014-0485
CVE.ORG link : CVE-2014-0485
JSON object : View
Products Affected
s3ql_project
- s3ql
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')