The secureload function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryptionkey.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.12.3-1ubuntu0.1", "binary_name": "python-gluon" }, { "binary_version": "2.12.3-1ubuntu0.1", "binary_name": "python-web2py" } ] }