2020-08-13 12:03:05 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
2020-12-17 16:01:41 +00:00
"ID" : "CVE-2020-22083" ,
"STATE" : "PUBLIC"
2020-08-13 12:03:05 +00:00
} ,
2020-12-17 16:01:41 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-08-13 12:03:05 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-12-22 14:01:54 +00:00
"value" : "** DISPUTED ** jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data."
2020-12-17 16:01:41 +00:00
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://github.com/j0lt-github/python-deserialization-attack-payload-generator" ,
"refsource" : "MISC" ,
"name" : "https://github.com/j0lt-github/python-deserialization-attack-payload-generator"
} ,
{
"url" : "https://versprite.com/blog/application-security/into-the-jar-jsonpickle-exploitation/" ,
"refsource" : "MISC" ,
"name" : "https://versprite.com/blog/application-security/into-the-jar-jsonpickle-exploitation/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/jsonpickle/jsonpickle/issues/332" ,
"url" : "https://github.com/jsonpickle/jsonpickle/issues/332"
} ,
{
"refsource" : "MISC" ,
"name" : "https://gist.github.com/j0lt-github/bb543e77a1a10c33cb56cf23d0837874" ,
"url" : "https://gist.github.com/j0lt-github/bb543e77a1a10c33cb56cf23d0837874"
2020-12-22 14:01:54 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/jsonpickle/jsonpickle/issues/332#issuecomment-747807494" ,
"url" : "https://github.com/jsonpickle/jsonpickle/issues/332#issuecomment-747807494"
} ,
{
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2020-22083" ,
"url" : "https://access.redhat.com/security/cve/CVE-2020-22083"
2020-08-13 12:03:05 +00:00
}
]
}
}