Логотип exploitDog
bind:CVE-2023-32321
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-32321

Количество 2

Количество 2

nvd логотип

CVE-2023-32321

больше 2 лет назад

CKAN is an open-source data management system for powering data hubs and data portals. Multiple vulnerabilities have been discovered in Ckan which may lead to remote code execution. An arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`. Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend. Potential DOS due to lack of a length check on the resource id. Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it. Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it. A user with permissions to create or edit a dataset can upload a resource with a sp

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-446m-hmmm-hm8m

больше 2 лет назад

Ckan remote code execution and private information access via crafted resource ids

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-32321

CKAN is an open-source data management system for powering data hubs and data portals. Multiple vulnerabilities have been discovered in Ckan which may lead to remote code execution. An arbitrary file write in `resource_create` and `package_update` actions, using the `ResourceUploader` object. Also reachable via `package_create`, `package_revise`, and `package_patch` via calls to `package_update`. Remote code execution via unsafe pickle loading, via Beaker's session store when configured to use the file session store backend. Potential DOS due to lack of a length check on the resource id. Information disclosure: A user with permission to create a resource can access any other resource on the system if they know the id, even if they don't have access to it. Resource overwrite: A user with permission to create a resource can overwrite any resource if they know the id, even if they don't have access to it. A user with permissions to create or edit a dataset can upload a resource with a sp

CVSS3: 9.8
3%
Низкий
больше 2 лет назад
github логотип
GHSA-446m-hmmm-hm8m

Ckan remote code execution and private information access via crafted resource ids

CVSS3: 9.8
3%
Низкий
больше 2 лет назад

Уязвимостей на страницу