The default configuration of glot-www through 2018-05-19 allows remote attackers to execute arbitrary code because glot-code-runner supports os.system within a "python" "files" "content" JSON file.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/prasmussen/glot-code-runner/issues/15 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2019-06-21T13:06:54
Updated: 2024-08-05T10:01:54.534Z
Reserved: 2018-08-23T00:00:00
Link: CVE-2018-15747

No data.

Status : Modified
Published: 2019-06-21T14:15:10.693
Modified: 2024-11-21T03:51:23.233
Link: CVE-2018-15747

No data.