Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2021-35196
HistoryJun 21, 2021 - 10:21 p.m.

CVE-2021-35196

2021-06-2122:21:39
mitre
github.com
2
manuskript
0.12.0
deserialization

AI Score

7.9

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor’s position is that the product is not intended for opening an untrusted project file

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:theologeek:manuskript:*:*:*:*:*:*:*:*"
    ],
    "vendor": "theologeek",
    "product": "manuskript",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "0.12.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

7.9

Confidence

Low

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2021-35196