An eval() vulnerability exists in Python Software Foundation Djblets 0.7.21 and Beanbag Review Board before 1.7.15 when parsing JSON requests.
[
{
"product": "Djblets",
"vendor": "Python Software Foundation; Beanbag",
"versions": [
{
"status": "affected",
"version": "0.7.21"
}
]
},
{
"product": "Review Board",
"vendor": "Python Software Foundation; Beanbag",
"versions": [
{
"status": "affected",
"version": "before 1.7.15"
}
]
}
]
lists.fedoraproject.org/pipermail/package-announce/2013-November/120619.html
lists.fedoraproject.org/pipermail/package-announce/2013-October/119819.html
lists.fedoraproject.org/pipermail/package-announce/2013-October/119820.html
lists.fedoraproject.org/pipermail/package-announce/2013-October/119830.html
lists.fedoraproject.org/pipermail/package-announce/2013-October/119831.html
www.securityfocus.com/bid/63029
access.redhat.com/security/cve/cve-2013-4409
bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4409
exchange.xforce.ibmcloud.com/vulnerabilities/88059
security-tracker.debian.org/tracker/CVE-2013-4409