GHSA-ccmq-qvcp-5mrm

Suggest an improvement
Source
https://github.com/advisories/GHSA-ccmq-qvcp-5mrm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-ccmq-qvcp-5mrm/GHSA-ccmq-qvcp-5mrm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-ccmq-qvcp-5mrm
Aliases
Published
2018-07-13T16:01:12Z
Modified
2024-10-07T21:23:20.228869Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Unsafe deserialization in owlmixin
Details

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka loadyaml or loadyamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:31:05Z"
}
References

Affected packages

PyPI / owlmixin

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0

Affected versions

1.*

1.0.0b3
1.0.0b4
1.0.0b6
1.0.0b7
1.0.0rc1
1.0.0rc2
1.0.0rc3
1.0.0rc4
1.0.0rc5
1.0.0rc6
1.0.0rc7
1.0.0rc8
1.0.0rc9
1.0.0rc10
1.0.0rc11
1.0.0rc12
1.0.0rc13
1.0.0rc14
1.0.0rc15
1.0.0rc16
1.0.0
1.1.0
1.2.0a1
1.2.0

2.*

2.0.0a1
2.0.0a2
2.0.0a3
2.0.0a4
2.0.0a5
2.0.0a6
2.0.0a7
2.0.0a9
2.0.0a10
2.0.0a11
2.0.0a12
2.0.0rc1