Description
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
Published: 2012-10-22
Score: 9.8 Critical
EPSS: 4.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v7mh-3jgf-r26c OpenStack Object Storage (swift) Code Injection vulnerability
Ubuntu USN Ubuntu USN USN-1887-1 OpenStack Swift vulnerabilities
History

No history.

Subscriptions

Fedoraproject Fedora
Openstack Swift
Redhat Enterprise Linux Server Gluster Storage Management Console Gluster Storage Server For On-premise Openstack Storage Storage For Public Cloud
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T20:35:09.281Z

Reserved: 2012-08-21T00:00:00.000Z

Link: CVE-2012-4406

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-10-22T23:55:06.743

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-4406

cve-icon Redhat

Severity : Important

Publid Date: 2012-05-30T00:00:00Z

Links: CVE-2012-4406 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses