Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T00:33:51.182Z
Reserved: 2021-06-21T00:00:00
Link: CVE-2021-35196
Updated: 2024-08-04T00:33:51.182Z
Status : Modified
Published: 2021-06-21T23:15:10.723
Modified: 2024-11-21T06:12:01.420
Link: CVE-2021-35196
No data.
OpenCVE Enrichment
No data.
Weaknesses