Vulnerability Description
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyconuk | Conference-Scheduler-Cli | <= 0.10.1 |
Related Weaknesses (CWE)
References
- https://github.com/PyconUK/ConferenceScheduler-cli/issues/19ExploitThird Party Advisory
- https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conferenc
- https://github.com/PyconUK/ConferenceScheduler-cli/issues/19ExploitThird Party Advisory
- https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conferenc
FAQ
What is CVE-2018-14572?
CVE-2018-14572 is a vulnerability with a CVSS score of 7.8 (HIGH). In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system...
How severe is CVE-2018-14572?
CVE-2018-14572 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-14572?
Check the references section above for vendor advisories and patch information. Affected products include: Pyconuk Conference-Scheduler-Cli.