CVE-2021-35196
21.06.2021, 23:15
Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project fileEnginsight
Vendor | Product | Version |
---|---|---|
theologeek | manuskript | 𝑥 ≤ 0.12.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration