Skip to content

Conversation

@gardera-security
Copy link

Update PyYAML to 4.1

Merge this pull request to resolve 2 vulnerabilities in version 3.12 of PyYAML.

CRITICAL - CVE-2017-18342: PyYAML: yaml.load() API could execute arbitrary code

Description

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

References

Publish date

2018-06-27

CRITICAL - CVE-2020-14343: PyYAML: incomplete fix for CVE-2020-1747

Description

A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.

References

Publish date

2021-02-09

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant