S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-09-02 14:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-0485
Mitre link : CVE-2014-0485
CVE.ORG link : CVE-2014-0485
JSON object : View
Products Affected
s3ql_project
- s3ql
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')