GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Nov 27, 2018 3:26 am Post subject: [ GLSA 201811-18 ] Tablib |
|
|
Gentoo Linux Security Advisory
Title: Tablib: Arbitrary command execution (GLSA 201811-18)
Severity: normal
Exploitable: remote
Date: 2018-11-27
Bug(s): #621884
ID: 201811-18
Synopsis
A vulnerability in Tablib might allow remote attackers to execute
arbitrary python commands.
Background
Tablib is an MIT Licensed format-agnostic tabular dataset library,
written in Python. It allows you to import, export, and manipulate
tabular data sets.
Affected Packages
Package: dev-python/tablib
Vulnerable: < 0.12.1
Unaffected: >= 0.12.1
Architectures: All supported architectures
Description
A vulnerability was discovered in Tablib’s Databook loading
functionality, due to improper input validation.
Impact
A remote attacker, by enticing the user to process a specially crafted
Databook via YAML, could possibly execute arbitrary python commands with
the privilege of the process.
Workaround
There is no known workaround at this time.
Resolution
All Tablib users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/tablib-0.12.1"
|
References
CVE-2017-2810 |
|