CRITICAL · 9.8

CVE-2013-4409

An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.

Vulnerability Description

An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
ReviewboardDjblets0.7.21
ReviewboardReview Board< 1.7.15
FedoraprojectFedora18
RedhatEnterprise Linux6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2013-4409?

CVE-2013-4409 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.

How severe is CVE-2013-4409?

CVE-2013-4409 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2013-4409?

Check the references section above for vendor advisories and patch information. Affected products include: Reviewboard Djblets, Reviewboard Review Board, Fedoraproject Fedora, Redhat Enterprise Linux.