Safety vulnerability ID: 69622
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A deserialization vulnerability exists in the way parso handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. Version 0.5.1 adds a note about the use of pickle.
NOTE: This is disputed because "the cache directory is not under control of the attacker in any common configuration."
Latest version: 0.8.4
A Python Parser
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application