Vulnerability Description
PCRS <= 3.11 (d0de1e) “Questions” page and “Code editor” page are vulnerable to remote code execution (RCE) by escaping Python sandboxing.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Utoronto | Pcrs | <= 3.11 |
Related Weaknesses (CWE)
References
- https://bitbucket.org/utmandrew/pcrs/commits/5f18bcbb383b7d73f7a8b399cc52b23597dPatch
- https://github.com/windecks/CVE-2023-46404ExploitMitigationPatch
- https://bitbucket.org/utmandrew/pcrs/commits/5f18bcbb383b7d73f7a8b399cc52b23597dPatch
- https://github.com/windecks/CVE-2023-46404ExploitMitigationPatch
FAQ
What is CVE-2023-46404?
CVE-2023-46404 is a vulnerability with a CVSS score of 9.9 (CRITICAL). PCRS <= 3.11 (d0de1e) “Questions” page and “Code editor” page are vulnerable to remote code execution (RCE) by escaping Python sandboxing.
How severe is CVE-2023-46404?
CVE-2023-46404 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-46404?
Check the references section above for vendor advisories and patch information. Affected products include: Utoronto Pcrs.