Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5396-497v-5r3r

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

EPSS

Процентиль: 87%
0.0315
Низкий

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

redhat
почти 12 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

nvd
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

debian
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 ...

EPSS

Процентиль: 87%
0.0315
Низкий

Дефекты

CWE-94