First published: Sun Oct 30 2011(Updated: )
The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent os.popen calls, which allows local users to bypass intended access restrictions and execute arbitrary commands via a dev_appserver.RestrictedPathFunction._original_os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google App Engine Python SDK | =1.4.3 | |
Google App Engine Python SDK | =1.1.5 | |
Google App Engine Python SDK | =1.3.4 | |
Google App Engine Python SDK | =1.2.6 | |
Google App Engine Python SDK | =1.2.2 | |
Google App Engine Python SDK | =1.2.7 | |
Google App Engine Python SDK | =1.1.7 | |
Google App Engine Python SDK | =1.0.2 | |
Google App Engine Python SDK | =1.1.3 | |
Google App Engine Python SDK | =1.5.2 | |
Google App Engine Python SDK | =1.1.0 | |
Google App Engine Python SDK | =1.3.1 | |
Google App Engine Python SDK | <=1.5.3 | |
Google App Engine Python SDK | =1.0.1 | |
Google App Engine Python SDK | =1.4.0 | |
Google App Engine Python SDK | =1.1.2 | |
Google App Engine Python SDK | =1.3.8 | |
Google App Engine Python SDK | =1.3.3 | |
Google App Engine Python SDK | =1.2.5 | |
Google App Engine Python SDK | =1.2.0 | |
Google App Engine Python SDK | =1.1.8 | |
Google App Engine Python SDK | =1.1.9 | |
Google App Engine Python SDK | =1.3.7 | |
Google App Engine Python SDK | =1.3.2 | |
Google App Engine Python SDK | =1.2.4 | |
Google App Engine Python SDK | =1.2.1 | |
Google App Engine Python SDK | =1.4.1 | |
Google App Engine Python SDK | =1.2.3 | |
Google App Engine Python SDK | =1.1.4 | |
Google App Engine Python SDK | =1.5.1 | |
Google App Engine Python SDK | =1.3.0 | |
Google App Engine Python SDK | =1.3.6 | |
Google App Engine Python SDK | =1.3.5 | |
Google App Engine Python SDK | =1.1.1 | |
Google App Engine Python SDK | =1.1.6 | |
Google App Engine Python SDK | =1.5.0 | |
Google App Engine Python SDK | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4212 has a medium severity rating as it allows local users to execute arbitrary commands.
To fix CVE-2011-4212, upgrade the Google App Engine Python SDK to version 1.5.4 or later.
Users running Google App Engine Python SDK versions up to 1.5.3 are affected by CVE-2011-4212.
The impact of CVE-2011-4212 is that it allows local users to bypass intended access restrictions.
CVE-2011-4212 affects multiple versions of the Google App Engine Python SDK including 1.0.1 through 1.5.3.