CVE-2023-49297

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49297
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49297.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-49297
Aliases
Related
Published
2023-12-05T21:15:07Z
Modified
2024-11-21T14:57:16.548281Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Google Drive API V2 tasks. Unsafe YAML deserilization will result in arbitrary code execution. A maliciously crafted YAML file can cause arbitrary code execution if PyDrive2 is run in the same directory as it, or if it is loaded in via LoadSettingsFile. This is a deserilization attack that will affect any user who initializes GoogleAuth from this package while a malicious yaml file is present in the same directory. This vulnerability does not require the file to be directly loaded through the code, only present. This issue has been addressed in commit c57355dc which is included in release version 1.16.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/iterative/pydrive2

Affected ranges

Type
GIT
Repo
https://github.com/iterative/pydrive2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.10.0
1.10.1
1.10.2
1.11.0
1.11.1
1.11.2
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.15.2
1.15.3
1.15.4
1.16.0
1.16.1
1.17.0
1.2.1
1.3.0
1.3.1
1.4.10
1.4.11
1.4.12
1.4.13
1.4.14
1.4.2
1.4.3
1.4.4
1.4.5
1.4.6
1.4.7
1.4.8
1.4.9
1.6.0
1.6.1
1.6.2
1.6.3
1.7.0
1.7.1
1.7.2
1.7.3
1.8.0
1.8.1
1.8.2
1.8.3
1.9.0
1.9.1
1.9.2
1.9.3
1.9.4