Описание
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Ссылки
- Mailing List
- Third Party Advisory
- Not Applicable
- Mailing List
- Mailing List
- Broken Link
- Issue TrackingPatch
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
- Patch
- Release Notes
- Mailing List
- Third Party Advisory
- Not Applicable
- Mailing List
- Mailing List
- Broken Link
- Issue TrackingPatch
- Issue TrackingPatch
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одно из
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
OpenStack Object Storage (swift) before 1.7.0 uses the loads function ...
OpenStack Object Storage (swift) Code Injection vulnerability
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2