CVE-2023-36467

Source
https://cve.org/CVERecord?id=CVE-2023-36467
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36467.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-36467
Aliases
  • GHSA-m922-chh7-8qcr
Published
2023-06-28T13:55:06.163Z
Modified
2026-02-11T01:50:40.565396Z
Severity
  • 8.0 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
AWS data.all vulnerable to RCE through user injection of Python Commands
Details

AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around.

Database specific
{
    "cwe_ids": [
        "CWE-94"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/36xxx/CVE-2023-36467.json"
}
References

Affected packages

Git / github.com/awslabs/aws-dataall

Affected ranges

Type
GIT
Repo
https://github.com/awslabs/aws-dataall
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.2.0"
        },
        {
            "fixed": "1.5.2"
        }
    ]
}

Affected versions

v1.*
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.5.0
v1.5.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36467.json"

Git / github.com/data-dot-all/dataall

Affected ranges

Type
GIT
Repo
https://github.com/data-dot-all/dataall
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*
v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.5.0
v1.5.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-36467.json"