Show plain JSON{"id": "CVE-2021-35196", "cveTags": [{"tags": ["disputed"], "sourceIdentifier": "cve@mitre.org"}], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2021-06-21T23:15:10.723", "references": [{"url": "https://github.com/olivierkes/manuskript/issues/891", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-502"}]}], "descriptions": [{"lang": "en", "value": "Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file"}, {"lang": "es", "value": "** EN DISPUTA ** Manuskript versiones hasta 0.12.0, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un archivo settings.pickle dise\u00f1ado en un archivo de proyecto, porque hay una deserializaci\u00f3n no segura por medio de la funci\u00f3n pickle.load() en el archivo settings.py. NOTA: la posici\u00f3n del vendedor es que el producto no est\u00e1 pensado para abrir un archivo de proyecto no confiable"}], "lastModified": "2024-07-19T19:15:06.043", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:theologeek:manuskript:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B8328F9-7D6A-4C8B-8BD4-79F19AAEED9D", "versionEndIncluding": "0.12.0"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}