Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12760

Опубликовано: 06 июн. 2019
Источник: debian
EPSS Низкий

Описание

A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
parsofixed0.5.1-0.1package

Примечания

  • https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7

  • https://github.com/davidhalter/parso/issues/75

  • Not considered a security issue by upstream

EPSS

Процентиль: 70%
0.00665
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 6 лет назад

A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration.

CVSS3: 3.3
nvd
около 6 лет назад

A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration.

CVSS3: 7.5
github
около 6 лет назад

Deserialization vulnerability exists in parso

EPSS

Процентиль: 70%
0.00665
Низкий