GHSA-3pqx-4fqf-j49f

Suggest an improvement
Source
https://github.com/advisories/GHSA-3pqx-4fqf-j49f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-3pqx-4fqf-j49f/GHSA-3pqx-4fqf-j49f.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3pqx-4fqf-j49f
Aliases
Published
2021-04-20T16:40:42Z
Modified
2024-10-25T21:23:11.506576Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Deserialization of Untrusted Data in PyYAML
Details

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

Database specific
{
    "nvd_published_at": "2020-02-19T04:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-08T19:24:04Z"
}
References

Affected packages

PyPI / pyyaml

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.1
Fixed
5.2

Affected versions

5.*

5.1
5.1.1
5.1.2
5.2b1