This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.
**Note:**
The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:
1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)
2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)
The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.
References
Link | Resource |
---|---|
https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca | Exploit Third Party Advisory |
https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021 | Patch |
https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 | Third Party Advisory |
https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca | Exploit Third Party Advisory |
https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021 | Patch |
https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca - Exploit, Third Party Advisory | |
References | () https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021 - Patch | |
References | () https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.4 |
03 Oct 2023, 15:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:derrickgilland:pydash:*:*:*:*:*:*:*:* | |
References | (MISC) https://gist.github.com/CalumHutton/45d33e9ea55bf4953b3b31c84703dfca - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/dgilland/pydash/commit/6ff0831ad285fff937cafd2a853f20cc9ae92021 - Patch | |
References | (MISC) https://security.snyk.io/vuln/SNYK-PYTHON-PYDASH-5916518 - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
First Time |
Derrickgilland pydash
Derrickgilland |
|
CWE | CWE-77 CWE-94 |
28 Sep 2023, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-28 05:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26145
Mitre link : CVE-2023-26145
CVE.ORG link : CVE-2023-26145
JSON object : View
Products Affected
derrickgilland
- pydash