Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
References
| Link | Resource |
|---|---|
| https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 | Release Notes Third Party Advisory |
| https://github.com/frostming/rediswrapper/pull/1 | Patch Third Party Advisory |
| https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 | Release Notes Third Party Advisory |
| https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 | Release Notes Third Party Advisory |
| https://github.com/frostming/rediswrapper/pull/1 | Patch Third Party Advisory |
| https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 04:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 - Release Notes, Third Party Advisory | |
| References | () https://github.com/frostming/rediswrapper/pull/1 - Patch, Third Party Advisory | |
| References | () https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 - Release Notes, Third Party Advisory |
Information
Published : 2019-10-05 23:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17206
Mitre link : CVE-2019-17206
CVE.ORG link : CVE-2019-17206
JSON object : View
Products Affected
redis_wrapper_project
- redis_wrapper
CWE
CWE-502
Deserialization of Untrusted Data
