CVE-2012-4406
Published: 22 October 2012
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Notes
Author | Note |
---|---|
jdstrand | design problem which requires access to the private swift network. Memcached portion is fixed upstream but adds a configuration option that defaults to using pickle serialization since not all memcached servers understand JSON. Marking as 'low' since this requires privileged network access (per upstream) |
Priority
Status
Package | Release | Status |
---|---|---|
swift Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Released
(1.4.8-0ubuntu2.2)
|
|
quantal |
Not vulnerable
(1.7.2-0ubuntu1)
|
|
raring |
Not vulnerable
|
|
upstream |
Released
(1.7.0)
|
|
Patches: upstream: https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a upstream: https://review.openstack.org/#/c/12492/ |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |