CVE-2011-4213

Current Description

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

Basic Data

PublishedOctober 30, 2011
Last ModifiedApril 10, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationGoogleApp Engine Python Sdk********1.5.4

Vulnerable Software List

VendorProductVersions
Google App Engine Python Sdk *

References

NameSourceURLTags
http://blog.watchfire.com/files/googleappenginesdk.pdfhttp://blog.watchfire.com/files/googleappenginesdk.pdfMISCExploit
http://code.google.com/p/googleappengine/wiki/SdkReleaseNoteshttp://code.google.com/p/googleappengine/wiki/SdkReleaseNotesMISCPATCH
google-apps-osmodule-priv-esc(71062)https://exchange.xforce.ibmcloud.com/vulnerabilities/71062XFVDB Entry