PYSEC-2020-49

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/jsonpickle/PYSEC-2020-49.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2020-49
Aliases
Published
2020-12-17T16:15:00Z
Modified
2024-02-01T21:11:37.159281Z
Summary
[none]
Details

* DISPUTED * jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function. Note: It has been argued that this is expected and clearly documented behaviour. pickle is known to be capable of causing arbitrary code execution, and must not be used with un-trusted data.

References

Affected packages

PyPI / jsonpickle

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.2

Affected versions

0.*

0.0.1
0.0.2
0.0.4
0.0.5
0.1.0
0.2.0
0.3.0
0.3.1
0.4.0
0.5.0-beta
0.5.0
0.6.0
0.6.1
0.7.0
0.7.1
0.7.2
0.8.0
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6

1.*

1.0
1.1
1.2
1.3
1.4
1.4.1