Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3957

Опубликовано: 06 фев. 2018
Источник: debian

Описание

The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
web2pyremovedpackage
web2pynot-affectedjessiepackage
web2pynot-affectedwheezypackage

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.

CVSS3: 9.8
nvd
около 8 лет назад

The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.

CVSS3: 9.8
github
больше 3 лет назад

The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.