EIQ-2019-0026
ID |
EIQ-2019-0026 |
CVE |
|
Description |
Parso could allow arbitrary code execution |
Date |
14 Jun 2019 |
Severity |
3 - HIGH |
CVSSv3 score |
7.5 |
Status |
2.6.0 |
Assessment |
Parso versions 0.4.0 and earlier are vulnerable to deserialization of untrusted data. The vulnerability affects grammar parsing from the cache. Cache loading relies on pickle. Pickle is not secure against erroneous or maliciously constructed data. To exploit the vulnerability, attackers must be able to create a folder, and to write files to the target system.
|
Mitigation |
Make sure that platform access through SSH, and that platform shell usage are restricted:
At the moment, it is not possible to globally upgrade Parso, because it occurs at least once as a sub-dependency. We cannot control these dependencies. |
Affected versions |
2.5.0 and earlier. |
Notes |
For more information, see: |
< Back to all security issues and mitigation actions
In release notes 2.5.0
In release notes 2.6.0