Описание
Unsafe pyyaml load usage in PyAnyAPI
An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-16616
- https://github.com/Stranger6667/pyanyapi/issues/41
- https://github.com/Stranger6667/pyanyapi/commit/810db626c18ebc261d5f4299d0f0eac38d5eb3cf
- https://github.com/Stranger6667/pyanyapi/releases/tag/0.6.1
- https://github.com/advisories/GHSA-vg8g-jpm9-jh8r
- https://github.com/pypa/advisory-database/tree/main/vulns/pyanyapi/PYSEC-2017-23.yaml
- https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparser-in-pyanyapi
- https://pypi.python.org/pypi/pyanyapi/0.6.1
Пакеты
pyanyapi
< 0.6.1
0.6.1
Связанные уязвимости
An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.