Логотип exploitDog
bind:CVE-2021-38305
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-38305

Количество 2

Количество 2

nvd логотип

CVE-2021-38305

больше 4 лет назад

23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-435p-f82x-mxwm

больше 4 лет назад

Command injection in Yamale

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-38305

23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale.

CVSS3: 7.8
1%
Низкий
больше 4 лет назад
github логотип
GHSA-435p-f82x-mxwm

Command injection in Yamale

CVSS3: 7.8
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу