CVE-2011-4212

CWE-2643 documents3 sources
Severity
7.2HIGH
EPSS
0.0%
top 93.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 30
Latest updateMay 17

Description

The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cp6x-wm76-3j63: The sandbox environment in the Google App Engine Python SDK before 12022-05-17
CVEList
CVE-2011-4212: The sandbox environment in the Google App Engine Python SDK before 12011-10-30
CVE-2011-4212 (HIGH CVSS 7.2) | The sandbox environment in the Goog | cvebase.io