Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-22083

Опубликовано: 17 дек. 2020
Источник: debian

Описание

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jsonpickleunfixedpackage

Примечания

  • CVE assigment seems bogus, jsonpickle clearly states "jsonpickle can execute arbitrary Python code.

  • Do not load jsonpickles from untrusted unauthenticated sources", so this works as expected

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

redhat
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

CVSS3: 9.8
nvd
около 5 лет назад

jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data

CVSS3: 9.8
github
больше 3 лет назад

jsonpickle unsafe deserialization