Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1747

Опубликовано: 02 мар. 2020
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

A vulnerability was discovered in the PyYAML library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

Отчет

Red Hat Quay 3.2 uses the vulnerable load function, but only to parse the Nginx configuration file, which only contains trusted data.

Меры по смягчению последствий

Use yaml.safe_load or the SafeLoader loader when you parse untrusted input.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6PyYAMLNot affected
Red Hat Enterprise Linux 7PyYAMLNot affected
Red Hat Enterprise Linux 8python27:2.7/PyYAMLNot affected
Red Hat Enterprise Linux 8PyYAMLNot affected
Red Hat Enterprise Linux 9PyYAMLNot affected
Red Hat OpenStack Platform 10 (Newton)PyYAMLNot affected
Red Hat OpenStack Platform 13 (Queens)PyYAMLNot affected
Red Hat Quay 3python-PyYAMLWill not fix
Red Hat Software Collectionspython27-PyYAMLNot affected
Red Hat Software Collectionsrh-python36-PyYAMLNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1807367PyYAML: arbitrary command execution through python/object/new when FullLoader is used

EPSS

Процентиль: 85%
0.02593
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVSS3: 9.8
nvd
около 5 лет назад

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVSS3: 9.8
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 9.8
debian
около 5 лет назад

A vulnerability was discovered in the PyYAML library in versions befor ...

suse-cvrf
около 5 лет назад

Security update for python-PyYAML

EPSS

Процентиль: 85%
0.02593
Низкий

9.8 Critical

CVSS3