GHSA-rprw-h62v-c2w7
Vulnerability from github
Published
2019-01-04 17:45
Modified
2024-10-16 20:51
Severity ?
Summary
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
Details
In PyYAML before 4.1, the yaml.load()
API could execute arbitrary code. In other words, yaml.safe_load
is not used.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "PyYAML" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-18342" ], "database_specific": { "cwe_ids": [ "CWE-502" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:55:26Z", "nvd_published_at": null, "severity": "CRITICAL" }, "details": "In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.", "id": "GHSA-rprw-h62v-c2w7", "modified": "2024-10-16T20:51:25Z", "published": "2019-01-04T17:45:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18342" }, { "type": "WEB", "url": "https://github.com/marshmallow-code/apispec/issues/278" }, { "type": "WEB", "url": "https://github.com/yaml/pyyaml/issues/193" }, { "type": "WEB", "url": "https://github.com/yaml/pyyaml/pull/74" }, { "type": "WEB", "url": "https://github.com/yaml/pyyaml/commit/7b68405c81db889f83c32846462b238ccae5be80" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pyyaml/PYSEC-2018-49.yaml" }, { "type": "PACKAGE", "url": "https://github.com/yaml/pyyaml" }, { "type": "WEB", "url": "https://github.com/yaml/pyyaml/blob/master/CHANGES" }, { "type": "WEB", "url": "https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202003-45" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "PyYAML insecurely deserializes YAML strings leading to arbitrary code execution" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.