SYM_PY_0066 - SymbioticSec/Symbiotic-Vulnerability-Database GitHub Wiki

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Property Value
Language python
Severity low
CWE CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
OWASP A03:2021 - Injection
Confidence Level Low
Impact Level Low
Likelihood Level Low

Description

Using logging.config.listen() in Python can be risky because it evaluates incoming configuration data with eval(), which may execute arbitrary code if the input isn't properly verified. This can inadvertently allow unsafe code to run within your application.

Impact

If exploited, an attacker with access to the local machine could send malicious configuration data that gets executed, potentially compromising the application's process. This could lead to unauthorized actions such as data theft, system manipulation, or further escalation of privileges on the host.