First published: Mon Nov 04 2019(Updated: )
An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/djblets | ||
debian/python-django-djblets | ||
pip/ReviewBoard | <1.7.15 | 1.7.15 |
pip/djblets | >=0.7.0<0.7.19 | 0.7.19 |
pip/djblets | <0.6.30 | 0.6.30 |
Review Board Djblets | =0.7.21 | |
Review Board | <1.7.15 | |
Fedora | =18 | |
Fedora | =19 | |
Fedora | =20 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4409 is classified as a high-severity vulnerability due to its potential to allow arbitrary code execution through improper JSON request parsing.
To fix CVE-2013-4409, upgrade Djblets to version 0.6.30 or later and ReviewBoard to version 1.7.15 or later.
CVE-2013-4409 affects Djblets versions before 0.6.30 and 0.7.19, and ReviewBoard versions before 1.7.15.
CVE-2013-4409 is an eval() vulnerability that arises from unsafe parsing of JSON requests in the affected software.
CVE-2013-4409 was disclosed in November 2013.