CVE-2011-4213
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.
El entorno Sandbox en el motor de aplicaciones de Google de Python SDK anterior a la versión 1.5.4, no impide apropiadamente el uso del módulo de sistema operativo, lo que permite a los usuarios locales omitir las restricciones de acceso previstas y ejecutar comandos arbitrarios por medio de una referencia file_blob_storage.os dentro del parámetro Code a _ah/admin/interactive/execute, una vulnerabilidad diferente a CVE-2011-1364.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-10-30 CVE Reserved
- 2011-10-30 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/71062 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://blog.watchfire.com/files/googleappenginesdk.pdf | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://code.google.com/p/googleappengine/wiki/SdkReleaseNotes | 2019-04-10 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Google Search vendor "Google" | App Engine Python Sdk Search vendor "Google" for product "App Engine Python Sdk" | < 1.5.4 Search vendor "Google" for product "App Engine Python Sdk" and version " < 1.5.4" | - |
Affected
|