First published: Mon Oct 27 2014(Updated: )
The `from_yaml` method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django-tastypie | <0.9.10 | 0.9.10 |
Djangoproject Tastypie | <=0.9.9 |
https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4104 is rated as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2011-4104, upgrade Django Tastypie to version 0.9.10 or later.
Django Tastypie versions prior to 0.9.10, including 0.9.9 and earlier, are affected by CVE-2011-4104.
CVE-2011-4104 allows remote attackers to execute arbitrary Python code through improperly deserialized YAML data.
CVE-2011-4104 is a server-side vulnerability affecting applications using Django Tastypie.