Vulnerability Description
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Web2Py | Web2Py | < 2.14.2 |
Related Weaknesses (CWE)
References
- https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957ExploitTechnical DescriptionThird Party Advisory
- https://github.com/web2py/web2py/blob/R-2.14.1/gluon/utils.py#L200Third Party Advisory
- https://usn.ubuntu.com/4030-1/
- https://devco.re/blog/2017/01/03/web2py-unserialize-code-execution-CVE-2016-3957ExploitTechnical DescriptionThird Party Advisory
- https://github.com/web2py/web2py/blob/R-2.14.1/gluon/utils.py#L200Third Party Advisory
- https://usn.ubuntu.com/4030-1/
FAQ
What is CVE-2016-3957?
CVE-2016-3957 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code ...
How severe is CVE-2016-3957?
CVE-2016-3957 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-3957?
Check the references section above for vendor advisories and patch information. Affected products include: Web2Py Web2Py.