CVE-2011-4211

Current Description

The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

Basic Data

PublishedOctober 30, 2011
Last ModifiedAugust 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGoogleApp Engine Python Sdk1.0.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.0.2*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.0*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.2*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.3*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.4*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.5*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.6*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.7*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.8*******
    2.3ApplicationGoogleApp Engine Python Sdk1.1.9*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.0*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.2*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.3*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.4*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.5*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.6*******
    2.3ApplicationGoogleApp Engine Python Sdk1.2.7*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.0*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.2*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.3*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.4*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.5*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.6*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.7*******
    2.3ApplicationGoogleApp Engine Python Sdk1.3.8*******
    2.3ApplicationGoogleApp Engine Python Sdk1.4.0*******
    2.3ApplicationGoogleApp Engine Python Sdk1.4.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.4.2*******
    2.3ApplicationGoogleApp Engine Python Sdk1.4.3*******
    2.3ApplicationGoogleApp Engine Python Sdk1.5.0*******
    2.3ApplicationGoogleApp Engine Python Sdk1.5.1*******
    2.3ApplicationGoogleApp Engine Python Sdk1.5.2*******
    2.3ApplicationGoogleApp Engine Python Sdk********1.5.3

Vulnerable Software List

VendorProductVersions
Google App Engine Python Sdk *, 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.3.5, 1.3.6, 1.3.7, 1.3.8, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.5.0, 1.5.1, 1.5.2

References

NameSourceURLTags
http://blog.watchfire.com/files/googleappenginesdk.pdfhttp://blog.watchfire.com/files/googleappenginesdk.pdfMISCExploit
http://code.google.com/p/googleappengine/wiki/SdkReleaseNoteshttp://code.google.com/p/googleappengine/wiki/SdkReleaseNotesMISCPatch
50464http://www.securityfocus.com/bid/50464BID
google-app-fakefile-priv-esc(71064)https://exchange.xforce.ibmcloud.com/vulnerabilities/71064XF