Bug 1908869 (CVE-2020-22083)
Summary: | CVE-2020-22083 python-jsonpickle: deserialization of a malicious payload in the decode function can lead to RCE | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | unspecified | CC: | bdettelb, cmeyers, fedora, gblomqui, gmainwar, gwync, kmullins, mabashia, notting, rbean, rpetrell, smcdonal, tomckay |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Python-jsonpickle allows remote code execution during deserialization of a malicious payload through the decode() function.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-12-18 07:31:08 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1908870, 1908871 | ||
Bug Blocks: | 1908873 |
Description
Guilherme de Almeida Suckevicz
2020-12-17 18:45:13 UTC
Created python-jsonpickle tracking bugs for this issue: Affects: epel-all [bug 1908871] Affects: fedora-all [bug 1908870] Statement: Both jsonpickle and pickle are documented as being able to execute arbitrary code when loading pickles, and intended for use only with trusted data. This is expected behaviour, as clearly indicated in the jsonpickle README and at https://docs.python.org/3/library/pickle.html This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-22083 |