conference-scheduler-cli Arbitrary Code Execution
High severity
GitHub Reviewed
Published
Oct 29, 2018
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published to the GitHub Advisory Database
Oct 29, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 13, 2024
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
References