CVE-2016-3957
moderate-risk
Published 2018-02-06
The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
Do I need to act?
!
12.7% chance of exploitation in next 30 days
EPSS score — higher than 87% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 32650f0cbf2c0211195e792a219899f74856b73e
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://github.com/web2py/web2py/blob/R-2.14.1/gluon/utils.py#L200
Third Party Advisory
https://github.com/web2py/web2py/blob/R-2.14.1/gluon/utils.py#L200
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
12/34 · Low
Exposure
5/34 · Minimal