Описание
Deserialization of Untrusted Data in Jython
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2016-4000
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
- https://hg.python.org/jython/file/v2.7.1rc1/NEWS
- https://hg.python.org/jython/rev/d06e29d100c0
- https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E
- https://security-tracker.debian.org/tracker/CVE-2016-4000
- https://security.gentoo.org/glsa/201710-28
- https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- http://bugs.jython.org/issue2454
- http://www.debian.org/security/2017/dsa-3893
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Пакеты
org.python:jython-standalone
<= 2.7.1b3
2.7.1
org.python:jython
<= 2.7.1-b3
2.7.1-rc1
Связанные уязвимости
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via ...
Уязвимость программной платформы Jython, связаная с восстановлением в памяти недостоверных данных и позволяющая нарушителю выполнить произвольный код