Vulnerability CVE-2011-4104


Published: 2014-10-26   Modified: 2014-10-27

Description:
The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Django tastypie project -> Django tastypie 
Djangoproject -> Tastypie 

 References:
http://www.openwall.com/lists/oss-security/2011/11/02/1
http://www.openwall.com/lists/oss-security/2011/11/02/7
https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2
https://groups.google.com/forum/#!topic/django-tastypie/i2aNGDHTUBI
https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/

Copyright 2024, cxsecurity.com

 

Back to Top