In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
References
Link | Resource |
---|---|
https://github.com/yaml/pyyaml/pull/74 | Patch Third Party Advisory |
https://github.com/yaml/pyyaml/blob/master/CHANGES | Release Notes Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/ | Third Party Advisory |
https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation | Third Party Advisory |
https://github.com/marshmallow-code/apispec/issues/278 | Third Party Advisory |
https://github.com/yaml/pyyaml/issues/193 | Third Party Advisory |
https://security.gentoo.org/glsa/202003-45 | Third Party Advisory |
Information
Published : 2018-06-27 05:29
Updated : 2020-10-14 06:23
NVD link : CVE-2017-18342
Mitre link : CVE-2017-18342
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
pyyaml
- pyyaml
fedoraproject
- fedora