Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
References
Link | Resource |
---|---|
https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 | Release Notes Third Party Advisory |
https://github.com/frostming/rediswrapper/pull/1 | Patch Third Party Advisory |
https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 | Release Notes Third Party Advisory |
https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 | Release Notes Third Party Advisory |
https://github.com/frostming/rediswrapper/pull/1 | Patch Third Party Advisory |
https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 | Release Notes Third Party Advisory |
Configurations
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 - Release Notes, Third Party Advisory | |
References | () https://github.com/frostming/rediswrapper/pull/1 - Patch, Third Party Advisory | |
References | () https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 - Release Notes, Third Party Advisory |
Information
Published : 2019-10-05 23:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17206
Mitre link : CVE-2019-17206
CVE.ORG link : CVE-2019-17206
JSON object : View
Products Affected
redis_wrapper_project
- redis_wrapper
CWE
CWE-502
Deserialization of Untrusted Data