PYSEC-2017-19

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/mlalchemy/PYSEC-2017-19.yaml
JSON Data
https://api.test.osv.dev/v1/vulns/PYSEC-2017-19
Aliases
Published
2017-11-08T03:29:00Z
Modified
2023-11-01T04:47:59.907188Z
Summary
[none]
Details

An exploitable vulnerability exists in the YAML parsing functionality in the parseyamlquery method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

References

Affected packages

PyPI / mlalchemy

Package

Affected ranges

Type
GIT
Repo
https://github.com/thanethomson/MLAlchemy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.2.2

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.1.3
0.2.0
0.2.1