Safety vulnerability ID: 34840
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Supervisor versions 3.0.1, 3.1.4, 3.2.4 and 3.3.3 include a fix for CVE-2017-11610: The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
Latest version: 4.2.5
A system for controlling process state under UNIX
------------------
- Backported from Supervisor 3.3.3: Fixed CVE-2017-11610. A vulnerability
was found where an authenticated client can send a malicious XML-RPC request
to ``supervisord`` that will run arbitrary shell commands on the server.
The commands will be run as the same user as ``supervisord``. Depending on
how ``supervisord`` has been configured, this may be root. See
https://github.com/Supervisor/supervisor/issues/964 for details.
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application