Deserialization of Untrusted Data The advisory has been revoked - it doesn't affect any version of package parso Open this link in a new tab
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.13% (48th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-PARSO-174930
- published 6 Jun 2019
- disclosed 6 Jun 2019
- credit Alexandre D'Hondt
Introduced: 6 Jun 2019
CVE-2019-12760 Open this link in a new tabAmendment
This was deemed not a vulnerability.
Overview
parso is a Python parser that supports error recovery and round-trip parsing for different Python versions.
Affected versions of this package are vulnerable to Deserialization of Untrusted Data. A deserialization vulnerability exists in the way parso handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution.