Логотип exploitDog
bind:CVE-2021-33026
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-33026

Количество 5

Количество 5

ubuntu логотип

CVE-2021-33026

больше 4 лет назад

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2021-33026

больше 4 лет назад

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision

CVSS3: 9.8
EPSS: Средний
debian логотип

CVE-2021-33026

больше 4 лет назад

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle ...

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-656c-6cxf-hvcv

больше 4 лет назад

Deserialization of Untrusted Data in Flask-Caching

CVSS3: 4.2
EPSS: Средний
fstec логотип

BDU:2021-04896

около 5 лет назад

Уязвимость расширения для программного обеспечения Flask Flask-caching, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-33026

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision

CVSS3: 9.8
16%
Средний
больше 4 лет назад
nvd логотип
CVE-2021-33026

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code. NOTE: a third party indicates that exploitation is extremely unlikely unless the machine is already compromised; in other cases, the attacker would be unable to write their payload to the cache and generate the required collision

CVSS3: 9.8
16%
Средний
больше 4 лет назад
debian логотип
CVE-2021-33026

The Flask-Caching extension through 1.10.1 for Flask relies on Pickle ...

CVSS3: 9.8
16%
Средний
больше 4 лет назад
github логотип
GHSA-656c-6cxf-hvcv

Deserialization of Untrusted Data in Flask-Caching

CVSS3: 4.2
16%
Средний
больше 4 лет назад
fstec логотип
BDU:2021-04896

Уязвимость расширения для программного обеспечения Flask Flask-caching, связанная с небезопасным управлением привилегиями, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

CVSS3: 9.8
16%
Средний
около 5 лет назад

Уязвимостей на страницу