Python dumbdbm "eval ()" Arbitrary Code Execution Vulnerability
Release date:
Updated on: 2014-12-01
Affected Systems:
Python python 3.x
Python python 2.7.x
Description:
Python is an object-oriented, literal translation computer programming language.
The dumbdbm module of Python 2.7.8 and other versions is not properly filtered. the internal input of the dir database backup file is used in the "eval ()" call. Attackers can trick users into opening the constructed database, attackers can exploit this vulnerability to inject and execute arbitrary code in Python code.
<* Source: Stephen Farris
Link: http://secunia.com/advisories/62457/
*>
Suggestion:
Vendor patch:
Python
------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://bugs.python.org/issue22885
Python initiates GET and POST requests to PHP
Python core programming version 2. (Wesley J. Chun). [Chinese version of hd pdf]
Python development technology details. (Zhou Wei, Zong Jie). [hd PDF scan version + book guide video + code]
Obtain Linux information using a Python script
Build a desktop algorithm transaction research environment using Python in Ubuntu
A Brief History of Python Development
Python details: click here
Python: click here
This article permanently updates the link address: