Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xpm8-98mx-h4c5

Опубликовано: 13 июл. 2018
Источник: github
Github: Прошло ревью
CVSS4: 9.3
CVSS3: 9.8

Описание

Unsafe deserialization in MLAlchemy

An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Пакеты

Наименование

MLAlchemy

pip
Затронутые версииВерсия исправления

< 0.2.2

0.2.2

EPSS

Процентиль: 75%
0.00896
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 8 лет назад

An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

EPSS

Процентиль: 75%
0.00896
Низкий

9.3 Critical

CVSS4

9.8 Critical

CVSS3