Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8278-88vv-x98r

Опубликовано: 10 мар. 2021
Источник: github
Github: Прошло ревью
CVSS4: 4.6
CVSS3: 5

Описание

Execution of untrusted code through config file

Impact

It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.

Workarounds

Manually adjust yaml.load() to yaml.safe_load()

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

tenable-jira-cloud

pip
Затронутые версииВерсия исправления

< 1.1.21

1.1.21

EPSS

Процентиль: 24%
0.00079
Низкий

4.6 Medium

CVSS4

5 Medium

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 5
nvd
почти 5 лет назад

Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().

EPSS

Процентиль: 24%
0.00079
Низкий

4.6 Medium

CVSS4

5 Medium

CVSS3

Дефекты

CWE-502