Vulnerability CVE-2021-35196


Published: 2021-06-21   Modified: 2021-06-22

Description:
** DISPUTED ** Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file.

Type:

CWE-502

(Deserialization of Untrusted Data)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Theologeek -> Manuskript 

 References:
https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/
https://github.com/olivierkes/manuskript/issues/891

Copyright 2024, cxsecurity.com

 

Back to Top