1 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution. Babel.Locale en Babel versiones anteriores a 2.9.1, permite a atacantes cargar archivos .dat de configuración regional arbitrarios (que contienen objetos Python serializados) por medio de salto de directorio, lo que conlleva a una ejecución de código A flaw was found in python-babel. A path traversal vulnerability was found in how locale data files are checked and loaded within python-babel, allowing a local attacker to trick an application that uses python-babel to load a file outside of the intended locale directory. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability. • https://github.com/python-babel/babel/pull/782 https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html https://lists.debian.org/debian-lts/2021/10/msg00040.html https://www.debian.org/security/2021/dsa-5018 https://www.tenable.com/security/research/tra-2021-14 https://access.redhat.com/security/cve/CVE-2021-42771 https://bugzilla.redhat.com/show_bug.cgi?id=1955615 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •