First published: Wed Jun 28 2023(Updated: )
AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Amazon Aws-dataall | >=1.2.0<=1.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for AWS data.all is CVE-2023-36467.
AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services.
The severity of CVE-2023-36467 is high with a severity value of 8.8.
The vulnerability in AWS data.all occurs when a user injects Python commands into the 'Template' field when configuring a data pipeline.
To fix CVE-2023-36467, update data.all to version 1.5.2 or 1.5.4.