Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-36467
HistoryJun 28, 2023 - 1:55 p.m.

CVE-2023-36467 AWS data.all vulnerable to RCE through user injection of Python Commands

2023-06-2813:55:06
CWE-94
GitHub_M
www.cve.org
2
aws data.all
remote code execution
python commands
authenticated users
data pipeline
data marketplace
aws
cve-2023-36467

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.005

Percentile

76.6%

AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around.

CNA Affected

[
  {
    "vendor": "awslabs",
    "product": "aws-dataall",
    "versions": [
      {
        "version": ">= 1.2.0, < 1.5.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

9.1

Confidence

High

EPSS

0.005

Percentile

76.6%

Related for CVELIST:CVE-2023-36467