mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
97 lines
3.0 KiB
JSON
97 lines
3.0 KiB
JSON
{
|
|
"id": "CVE-2011-4213",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2011-10-30T19:55:01.053",
|
|
"lastModified": "2019-04-10T15:14:56.700",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El entorno Sandbox en el motor de aplicaciones de Google de Python SDK anterior a la versi\u00f3n 1.5.4, no impide apropiadamente el uso del m\u00f3dulo de sistema operativo, lo que permite a los usuarios locales omitir las restricciones de acceso previstas y ejecutar comandos arbitrarios por medio de una referencia file_blob_storage.os dentro del par\u00e1metro Code a _ah/admin/interactive/execute, una vulnerabilidad diferente a CVE-2011-1364."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:google:app_engine_python_sdk:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.5.4",
|
|
"matchCriteriaId": "50413F23-6A56-4A76-9061-5DD1B6FC17CA"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://blog.watchfire.com/files/googleappenginesdk.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://code.google.com/p/googleappengine/wiki/SdkReleaseNotes",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71062",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"VDB Entry"
|
|
]
|
|
}
|
|
]
|
|
} |