8.8
CWE
94
Advisory Published
Updated

CVE-2023-36467: AWS data.all vulnerable to RCE through user injection of Python Commands

First published: Wed Jun 28 2023(Updated: )

AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Amazon Aws-dataall>=1.2.0<=1.5.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for AWS data.all?

    The vulnerability ID for AWS data.all is CVE-2023-36467.

  • What is AWS data.all?

    AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services.

  • What is the severity of CVE-2023-36467?

    The severity of CVE-2023-36467 is high with a severity value of 8.8.

  • How does the vulnerability in AWS data.all occur?

    The vulnerability in AWS data.all occurs when a user injects Python commands into the 'Template' field when configuring a data pipeline.

  • How can I fix CVE-2023-36467?

    To fix CVE-2023-36467, update data.all to version 1.5.2 or 1.5.4.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203