It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.
Manually adjust yaml.load() to yaml.safe_load()
If you have any questions or comments about this advisory: * Open an issue in tenable/integration-jira-cloud * Email us at vulnreport@tenable.com
{ "github_reviewed_at": "2021-03-10T21:51:06Z", "cwe_ids": [ "CWE-502" ], "nvd_published_at": "2021-03-10T22:15:00Z", "severity": "MODERATE", "github_reviewed": true }