Логотип exploitDog
bind:CVE-2021-21371
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-21371

Количество 2

Количество 2

nvd логотип

CVE-2021-21371

почти 5 лет назад

Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().

CVSS3: 5
EPSS: Низкий
github логотип

GHSA-8278-88vv-x98r

почти 5 лет назад

Execution of untrusted code through config file

CVSS3: 5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-21371

Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().

CVSS3: 5
0%
Низкий
почти 5 лет назад
github логотип
GHSA-8278-88vv-x98r

Execution of untrusted code through config file

CVSS3: 5
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу