{"id":"CVE-2019-12760","details":"A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because \"the cache directory is not under control of the attacker in any common configuration.","aliases":["GHSA-22mf-97vh-x8rw","PYSEC-2019-109"],"modified":"2026-03-14T09:32:28.570687Z","published":"2019-06-06T19:29:00.500Z","references":[{"type":"REPORT","url":"https://github.com/davidhalter/parso/issues/75"},{"type":"EVIDENCE","url":"https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/davidhalter/parso","events":[{"introduced":"0"},{"last_affected":"8a06f0da0592b33ff002bf699d05e7c31a613b17"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.4.0"}]}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.4","v0.1.0","v0.1.1","v0.2.0","v0.2.1","v0.3.0","v0.3.1","v0.3.2","v0.3.3","v0.3.4","v0.4.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-12760.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}