First published: Tue Nov 01 2011(Updated: )
A flaw in Piston, a popular REST API framework for Django, was reported [1] in how it handles de-serialization of YAML post data. It uses the yaml.load method, which is unsafe and in certain circumstances could be used to allow remote execution of arbitrary code. The updated versions of Piston (0.2.3 and 0.2.2.1) correctly use the yaml.safe_load method which prevents remote code execution. This does not affect Django itself, but any users who have installed and use the django-piston package on Fedora may be vulnerable. The upstream patch [2] is in git. [1] <a href="https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/">https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases/</a> [2] <a href="https://bitbucket.org/jespern/django-piston/changeset/91bdaec89543">https://bitbucket.org/jespern/django-piston/changeset/91bdaec89543</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Djangoproject Piston | <=0.2.2.0 | |
pip/django-piston | >=0.2.0<0.2.2.1 | 0.2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.