GHSA-vg8g-jpm9-jh8r

Suggest an improvement
Source
https://github.com/advisories/GHSA-vg8g-jpm9-jh8r
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vg8g-jpm9-jh8r/GHSA-vg8g-jpm9-jh8r.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-vg8g-jpm9-jh8r
Aliases
Published
2022-05-13T01:44:08Z
Modified
2024-10-21T21:01:29.823210Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Unsafe pyyaml load usage in PyAnyAPI
Details

An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Database specific
{
    "nvd_published_at": "2017-11-08T03:29:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2022-05-26T18:45:59Z"
}
References

Affected packages

PyPI / pyanyapi

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.6.1

Affected versions

0.*

0.4
0.5
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5
0.5.6
0.5.7
0.5.8
0.6.0