First published: Sun Oct 30 2011(Updated: )
Cross-site request forgery (CSRF) vulnerability in _ah/admin/interactive/execute (aka the Interactive Console) in the SDK Console (aka Admin Console) in the Google App Engine Python SDK before 1.5.4 allows remote attackers to hijack the authentication of administrators for requests that execute arbitrary Python code via the code parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google App Engine Python SDK | =1.4.3 | |
Google App Engine Python SDK | =1.1.5 | |
Google App Engine Python SDK | =1.3.4 | |
Google App Engine Python SDK | =1.2.6 | |
Google App Engine Python SDK | =1.2.2 | |
Google App Engine Python SDK | =1.2.7 | |
Google App Engine Python SDK | =1.1.7 | |
Google App Engine Python SDK | =1.0.2 | |
Google App Engine Python SDK | =1.1.3 | |
Google App Engine Python SDK | =1.5.2 | |
Google App Engine Python SDK | =1.1.0 | |
Google App Engine Python SDK | =1.3.1 | |
Google App Engine Python SDK | <=1.5.3 | |
Google App Engine Python SDK | =1.0.1 | |
Google App Engine Python SDK | =1.4.0 | |
Google App Engine Python SDK | =1.1.2 | |
Google App Engine Python SDK | =1.3.8 | |
Google App Engine Python SDK | =1.3.3 | |
Google App Engine Python SDK | =1.2.5 | |
Google App Engine Python SDK | =1.2.0 | |
Google App Engine Python SDK | =1.1.8 | |
Google App Engine Python SDK | =1.1.9 | |
Google App Engine Python SDK | =1.3.7 | |
Google App Engine Python SDK | =1.3.2 | |
Google App Engine Python SDK | =1.2.4 | |
Google App Engine Python SDK | =1.2.1 | |
Google App Engine Python SDK | =1.4.1 | |
Google App Engine Python SDK | =1.2.3 | |
Google App Engine Python SDK | =1.1.4 | |
Google App Engine Python SDK | =1.5.1 | |
Google App Engine Python SDK | =1.3.0 | |
Google App Engine Python SDK | =1.3.6 | |
Google App Engine Python SDK | =1.3.5 | |
Google App Engine Python SDK | =1.1.1 | |
Google App Engine Python SDK | =1.1.6 | |
Google App Engine Python SDK | =1.5.0 | |
Google App Engine Python SDK | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.