PYSEC-2019-109

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/parso/PYSEC-2019-109.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2019-109
Aliases
Published
2019-06-06T19:29:00Z
Modified
2023-11-08T04:01:06.251068Z
Summary
[none]
Details

** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration."

References

Affected packages

PyPI / parso

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.0

Affected versions

0.*
0.0.1
0.0.2
0.0.3
0.0.4
0.1.0
0.1.1
0.2.0
0.2.1
0.3.0
0.3.1
0.3.2
0.3.3
0.3.4
0.4.0

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/parso/PYSEC-2019-109.yaml"