The secure_load function in gluon/utils.py in web2py before 2.14.2 uses pickle.loads to deserialize session information stored in cookies, which might allow remote attackers to execute arbitrary code by leveraging knowledge of encryption_key.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Web2py | Web2py | * | 2.14.2 (excluding) |
Web2py | Ubuntu | artful | * |
Web2py | Ubuntu | esm-apps/xenial | * |
Web2py | Ubuntu | xenial | * |