Show plain JSON{"id": "CVE-2013-5942", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-09-27T10:08:04.367", "references": [{"url": "http://secunia.com/advisories/54556", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/54556", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093."}, {"lang": "es", "value": "Graphite 0.9.5 hasta la versi\u00f3n 0.9.10 usa el m\u00f3dulo pickle en Python de forma insegura, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto serializado manipulado, relacionado con (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, y (4) whitelist/views.py, una vulnerabilidad diferente a CVE-2013-5093."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCEF5ED7-C646-4FEB-AD98-D40EEC7F6568"}, {"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AF25C87-3E10-4E21-969B-46CFFFFF56C1"}, {"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5F6B829-CA80-4090-9825-41B7C137DCB2"}, {"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BCDBA0F-3476-48FF-847A-4A58EBE97DFF"}, {"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62212D19-7489-4DCB-93AD-E00BB9065B67"}, {"criteria": "cpe:2.3:a:graphite_project:graphite:0.9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "690CA1B7-9CBE-4D8D-9D81-E1198170D167"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}