CVE-2019-17206: Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts
(updated )
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.
References
- github.com/advisories/GHSA-vrcf-g539-x6h3
- github.com/frostming/rediswrapper
- github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b
- github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0
- github.com/frostming/rediswrapper/pull/1
- github.com/frostming/rediswrapper/releases/tag/v0.3.0
- github.com/pypa/advisory-database/tree/main/vulns/rediswrapper/PYSEC-2019-116.yaml
- nvd.nist.gov/vuln/detail/CVE-2019-17206
Detect and mitigate CVE-2019-17206 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →