First published: Fri Sep 27 2013(Updated: )
Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/graphite-web | >=0.9.5<=0.9.10 | 0.9.11 |
Graphite | =0.9.5 | |
Graphite | =0.9.6 | |
Graphite | =0.9.7 | |
Graphite | =0.9.8 | |
Graphite | =0.9.9 | |
Graphite | =0.9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5942 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2013-5942, upgrade Graphite to version 0.9.11 or later.
CVE-2013-5942 affects Graphite versions 0.9.5 through 0.9.10.
CVE-2013-5942 is a remote code execution vulnerability due to unsafe usage of the pickle Python module.
There are no effective workarounds for CVE-2013-5942; upgrading to a secure version is recommended.