S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://bitbucket.org/nikratio/s3ql/commits/091ac263809b4e8 | patch exploit |
http://www.debian.org/security/2014/dsa-3013 | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/08/28/3 | mailing list |