Python 1.5.2 Pickle – Unsafe ‘eval()’ Code Execution

Python 1.5.2 Pickle – Unsafe ‘eval()’ Code Execution

漏洞ID 1053603 漏洞类型
发布时间 2002-07-17 更新时间 2002-07-17
图片[1]-Python 1.5.2 Pickle – Unsafe ‘eval()’ Code Execution-安全小百科CVE编号 N/A
图片[2]-Python 1.5.2 Pickle – Unsafe ‘eval()’ Code Execution-安全小百科CNNVD-ID N/A
漏洞平台 Linux CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/21623
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/5255/info

Python is an open source, object oriented programming language. The Python Pickle module is provided to convert object variables into a serialized form ("pickling"), and later recover the data back into an object hierarchy ("unpickling").

A vulnerability has been reported in the Pickle implementation included with some versions of Python. If malicious data is "unpickled", it may execute arbitrary Python commands. It is also possible to make system() calls.

Exploitation of this vulnerability will be highly dependent on a specific Python application which accepts a "pickle" string from an untrusted source. This behavior has been reported in some implementations of the Python SmartCookie class. 

"S''*__import__('os').system('echo 0wn3d')np0n."

相关推荐: Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x – ‘ALG’ Client

Check Point Software Firewall-1 3.0/1 4.0 / Cisco PIX Firewall 4.x/5.x – ‘ALG’ Client 漏洞ID 1053440 漏洞类型 发布时间 2000-03-10 更新时间 2000-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享