Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4972

Опубликовано: 26 сент. 2016
Источник: debian
EPSS Низкий

Описание

OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
muranofixed1:2.0.1-1package
murano-dashboardfixed1:2.0.0-5package
python-muranoclientfixed0.8.3-4package

Примечания

  • Affects: Murano: <=2015.1.1; <=1.0.2; ==2.0.0

  • Affects: Murano-dashboard: <=2015.1.1; <=1.0.2; ==2.0.0

  • Affects: Python-muranoclient: <=0.7.2; >=0.8.0<=0.8.4

EPSS

Процентиль: 88%
0.03928
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

redhat
больше 9 лет назад

OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

CVSS3: 9.8
nvd
больше 9 лет назад

OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

CVSS3: 9.8
github
больше 3 лет назад

OpenStack Murano Code Execution

EPSS

Процентиль: 88%
0.03928
Низкий