// For flags

CVE-2011-4213

 

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

El entorno Sandbox en el motor de aplicaciones de Google de Python SDK anterior a la versión 1.5.4, no impide apropiadamente el uso del módulo de sistema operativo, lo que permite a los usuarios locales omitir las restricciones de acceso previstas y ejecutar comandos arbitrarios por medio de una referencia file_blob_storage.os dentro del parámetro Code a _ah/admin/interactive/execute, una vulnerabilidad diferente a CVE-2011-1364.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-10-30 CVE Reserved
  • 2011-10-30 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Google
Search vendor "Google"
App Engine Python Sdk
Search vendor "Google" for product "App Engine Python Sdk"
< 1.5.4
Search vendor "Google" for product "App Engine Python Sdk" and version " < 1.5.4"
-
Affected