Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20477

Опубликовано: 18 нояб. 2019
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

A vulnerability was discovered in the PyYAML library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/apply constructor.

Отчет

This issue did not affect the versions of PyYAML as shipped with Red Hat Enterprise Linux 7, and 8 as they did not include the class FullLoader, which contains this vulnerability. The PyYAML libary that is provided in the Red Hat OpenStack repositories is vulnerable. However, because there are no instances where this library is used in a way which exposes the vulnerability, the impact to OpenStack products has been reduced to 'low' and Red Hat will not be providing a fix at this time. Any updates will be through RHEL channels. Red Hat Quay 3.2 uses the vulnerable load function, but only to parse the Nginx configuration file, which only contains trusted data.

Меры по смягчению последствий

Use yaml.safe_load or the SafeLoader loader when you parse untrusted input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6PyYAMLOut of support scope
Red Hat Enterprise Linux 7PyYAMLNot affected
Red Hat Enterprise Linux 8python27:2.7/PyYAMLNot affected
Red Hat Enterprise Linux 8PyYAMLNot affected
Red Hat OpenStack Platform 10 (Newton)PyYAMLWill not fix
Red Hat OpenStack Platform 13 (Queens)PyYAMLWill not fix
Red Hat Software Collectionspython27-PyYAMLNot affected
Red Hat Software Collectionsrh-python36-PyYAMLNot affected
Red Hat Software Collectionsrh-python38-PyYAMLNot affected
Red Hat Enterprise Linux 8python38FixedRHSA-2020:464104.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1806005PyYAML: command execution through python/object/apply constructor in FullLoader

EPSS

Процентиль: 73%
0.008
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
nvd
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

CVSS3: 9.8
debian
больше 5 лет назад

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and ...

CVSS3: 9.8
github
около 4 лет назад

Deserialization of Untrusted Data in PyYAML

rocky
больше 4 лет назад

Moderate: python38:3.8 security, bug fix, and enhancement update

EPSS

Процентиль: 73%
0.008
Низкий

9.8 Critical

CVSS3

Уязвимость CVE-2019-20477