Python Package: conference-scheduler-cli
Version: <= 0.10.1
Published: 24 Jul 2018
Reported by: Joel
CVE-2018-14572 CVE_details
Overview
In conference-scheduler-cli
, a pickle.load
call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system
call.
POC
1 2 3 4 5 6 7 8 9 10 11 12 13 |
|
Remediation
It should use yaml.safe_load
to parse yaml file.