Exploit Python 1.5.2 Pickle - Unsafe 'eval()' Code Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
21623
Проверка EDB
  1. Пройдено
Автор
JEFF EPLER
Тип уязвимости
LOCAL
Платформа
LINUX
CVE
null
Дата публикации
2002-07-17
Код:
source: https://www.securityfocus.com/bid/5255/info

Python is an open source, object oriented programming language. The Python Pickle module is provided to convert object variables into a serialized form ("pickling"), and later recover the data back into an object hierarchy ("unpickling").

A vulnerability has been reported in the Pickle implementation included with some versions of Python. If malicious data is "unpickled", it may execute arbitrary Python commands. It is also possible to make system() calls.

Exploitation of this vulnerability will be highly dependent on a specific Python application which accepts a "pickle" string from an untrusted source. This behavior has been reported in some implementations of the Python SmartCookie class. 

"S''*__import__('os').system('echo 0wn3d')\np0\n."
 
Источник
www.exploit-db.com

Похожие темы