First published: Sun Oct 30 2011(Updated: )
The sandbox environment in the Google App Engine Python SDK before 1.5.4 does not properly prevent use of the os module, which allows local users to bypass intended access restrictions and execute arbitrary commands via a file_blob_storage.os reference within the code parameter to _ah/admin/interactive/execute, a different vulnerability than CVE-2011-1364.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google App Engine Python SDK | <1.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4213 is considered a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2011-4213, upgrade the Google App Engine Python SDK to version 1.5.4 or later.
CVE-2011-4213 allows local users to bypass access restrictions, potentially leading to unauthorized command execution in your application.
CVE-2011-4213 affects users of the Google App Engine Python SDK versions prior to 1.5.4.
Yes, CVE-2011-4213 allows exploitation through a file_blob_storage.os reference, which relates to file access and permissions.