Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-18342

Опубликовано: 27 июн. 2018
Источник: debian

Описание

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pyyamlfixed5.1.2-1package

Примечания

  • This is a well-known design deficiency in pyyaml, various CVE IDs have been assigned

  • to applications misusing the API over the years. The CVE ID was assigned to raise

  • awareness (and 5.1 now fixes the default behaviour as well)

  • https://github.com/yaml/pyyaml/pull/74

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

CVSS3: 8.1
redhat
почти 7 лет назад

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

CVSS3: 9.8
nvd
почти 7 лет назад

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

CVSS3: 9.8
github
больше 6 лет назад

PyYAML insecurely deserializes YAML strings leading to arbitrary code execution

CVSS3: 9.8
fstec
почти 7 лет назад

Уязвимость компонента yaml.load() библиотеки парсинга YAML для Python PyYAML, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании