Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-435p-f82x-mxwm

Опубликовано: 11 авг. 2021
Источник: github
Github: Прошло ревью
CVSS4: 8.5
CVSS3: 7.8

Описание

Command injection in Yamale

23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.

Пакеты

Наименование

yamale

pip
Затронутые версииВерсия исправления

< 3.0.8

3.0.8

EPSS

Процентиль: 75%
0.0086
Низкий

8.5 High

CVSS4

7.8 High

CVSS3

Дефекты

CWE-434
CWE-78

Связанные уязвимости

CVSS3: 7.8
nvd
больше 4 лет назад

23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.

EPSS

Процентиль: 75%
0.0086
Низкий

8.5 High

CVSS4

7.8 High

CVSS3

Дефекты

CWE-434
CWE-78