Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-4104

Опубликовано: 27 окт. 2014
Источник: debian

Описание

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
django-tastypiefixed0.9.10-1package

Связанные уязвимости

ubuntu
больше 11 лет назад

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

nvd
больше 11 лет назад

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

CVSS3: 9.8
github
больше 3 лет назад

Django Tastypie Improper Deserialization of YAML Data