Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-35196

Опубликовано: 21 июн. 2021
Источник: debian
EPSS Низкий

Описание

Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file

Пакеты

ПакетСтатусВерсия исправленияРелизТип
manuskriptfixed0.14.0-1package
manuskriptno-dsabullseyepackage
manuskriptno-dsabusterpackage

Примечания

  • https://github.com/olivierkes/manuskript/issues/891

  • https://github.com/olivierkes/manuskript/pull/895

  • https://github.com/olivierkes/manuskript/commit/6f841f96553fb2549accf2b16a4713871378ddc4 (0.13.1)

EPSS

Процентиль: 73%
0.0075
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file

CVSS3: 7.8
nvd
больше 4 лет назад

Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file

CVSS3: 7.8
github
больше 3 лет назад

** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file.

CVSS3: 8.8
fstec
больше 4 лет назад

Уязвимость функции pickle.load() программного обеспечения для писателей Manuskript, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 73%
0.0075
Низкий