AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around.
References
Link | Resource |
---|---|
https://github.com/awslabs/aws-dataall/pull/472 | Patch |
https://github.com/awslabs/aws-dataall/releases/tag/v1.5.2 | Release Notes |
https://github.com/awslabs/aws-dataall/releases/tag/v1.5.4 | Release Notes |
https://github.com/awslabs/aws-dataall/security/advisories/GHSA-m922-chh7-8qcr | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-06-28 14:15
Updated : 2023-07-07 17:18
NVD link : CVE-2023-36467
Mitre link : CVE-2023-36467
CVE.ORG link : CVE-2023-36467
JSON object : View
Products Affected
amazon
- aws-dataall
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')