Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-0122237C24EBC33E14E11DEC0AD0E301
HistoryMay 05, 2022 - 12:00 a.m.

ReviewBoard and Djblets library are vulnerable to code execution

2022-05-0500:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
8
input validation
eval vulnerability
python software foundation
djblets 0.7.21
beanbag review board
json requests

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.016

Percentile

87.6%

An eval() vulnerability exists in Python Software Foundation Djblets version before 0.6.30 and 0.7.0 before 0.7.19 and Beanbag Review Board before 1.7.15 when parsing JSON requests allowing an attacker to execute arbitrary Python code.

Affected configurations

Vulners
Node
pypiml-scannerRange<0.6.30pypi
OR
pypiml-scannerRange0.7.0pypi
OR
pypiml-scannerRange<0.7.19pypi
VendorProductVersionCPE
pypiml-scanner*cpe:2.3:a:pypi:ml-scanner:*:*:*:*:*:pypi:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.016

Percentile

87.6%

Related for GITLAB-0122237C24EBC33E14E11DEC0AD0E301