PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
References
Link | Resource |
---|---|
https://github.com/yaml/pyyaml/blob/master/CHANGES | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/ | |
https://www.exploit-db.com/download/47655 | Exploit Third Party Advisory VDB Entry |
Configurations
History
01 Jan 2022, 19:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/ - Mailing List, Third Party Advisory |
Information
Published : 2020-02-19 04:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-20477
Mitre link : CVE-2019-20477
CVE.ORG link : CVE-2019-20477
JSON object : View
Products Affected
pyyaml
- pyyaml
fedoraproject
- fedora
CWE
CWE-502
Deserialization of Untrusted Data