glot-code-runner RCE
Critical severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jul 19, 2023
Package
Affected versions
<= 2018-05-19
Patched versions
None
Description
Published by the National Vulnerability Database
Jun 21, 2019
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Jul 19, 2023
Last updated
Jul 19, 2023
The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.
References