CVE-2011-4211

CWE-2643 documents3 sources
Severity
7.2HIGH
EPSS
0.0%
top 92.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 30
Latest updateMay 17

Description

The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly control the opening of files, which allows local users to bypass intended access restrictions and create arbitrary files via ALLOWED_MODES and ALLOWED_DIRS changes within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6v7g-4373-j423: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 12022-05-17
CVEList
CVE-2011-4211: The FakeFile implementation in the sandbox environment in the Google App Engine Python SDK before 12011-10-30
CVE-2011-4211 (HIGH CVSS 7.2) | The FakeFile implementation in the | cvebase.io