Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-38305

Опубликовано: 09 авг. 2021
Источник: nvd
CVSS3: 7.8
CVSS2: 9.3
EPSS Низкий

Описание

23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:23andme:yamale:*:*:*:*:*:*:*:*
Версия до 3.0.8 (исключая)

EPSS

Процентиль: 75%
0.0086
Низкий

7.8 High

CVSS3

9.3 Critical

CVSS2

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 7.8
github
больше 4 лет назад

Command injection in Yamale

EPSS

Процентиль: 75%
0.0086
Низкий

7.8 High

CVSS3

9.3 Critical

CVSS2

Дефекты

CWE-434