CVE-2023-36467
Summary
| CVE | CVE-2023-36467 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-06-28 14:15:00 UTC |
| Updated | 2023-07-07 17:18:00 UTC |
| Description | AWS data.all is an open source development framework to help users build a data marketplace on Amazon Web Services. data.all versions 1.2.0 through 1.5.1 do not prevent remote code execution when a user injects Python commands into the ‘Template’ field when configuring a data pipeline. The issue can only be triggered by authenticated users. A fix for this issue is available in data.all version 1.5.2 and later. There is no recommended work around. |
Risk And Classification
Problem Types: CWE-94
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Amazon | Aws-dataall | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| hotfix: Remove GitHub template option from data.all Pipelines by dlpzx · Pull Request #472 · awslabs/aws-dataall · GitHub | MISC | github.com | |
| data.all vulnerable to RCE through user injection of Python Commands · Advisory · awslabs/aws-dataall · GitHub | MISC | github.com | |
| Release v1.5.2 · awslabs/aws-dataall · GitHub | MISC | github.com | |
| Release v1.5.4 · awslabs/aws-dataall · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.