2017-10-16 12:31:07 -04:00
{
2019-03-17 23:30:57 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "secalert@redhat.com" ,
"ID" : "CVE-2011-4103" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:30:57 +00:00
"lang" : "eng" ,
"value" : "emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:30:57 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=750658" ,
"refsource" : "CONFIRM" ,
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=750658"
} ,
{
"name" : "https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/" ,
"refsource" : "CONFIRM" ,
"url" : "https://bitbucket.org/jespern/django-piston/commits/91bdaec89543/"
} ,
{
"name" : "DSA-2344" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2011/dsa-2344"
} ,
{
"name" : "https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/" ,
"refsource" : "MISC" ,
"url" : "https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/"
} ,
{
"name" : "[oss-security] 20111101 Re: CVE request for Django-piston and Tastypie" ,
"refsource" : "MLIST" ,
"url" : "http://www.openwall.com/lists/oss-security/2011/11/01/10"
}
]
}
}