Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ccmq-qvcp-5mrm

Опубликовано: 13 июл. 2018
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

Unsafe deserialization in owlmixin

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Пакеты

Наименование

owlmixin

pip
Затронутые версииВерсия исправления

< 2.0.0

2.0.0

EPSS

Процентиль: 83%
0.02016
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
около 8 лет назад

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

EPSS

Процентиль: 83%
0.02016
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-502