Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
References
Link | Resource |
---|---|
https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r | Third Party Advisory |
https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0 | Patch Third Party Advisory |
https://pypi.org/project/tenable-jira-cloud/ | Product Third Party Advisory |
https://pyyaml.docsforge.com/master/documentation/#loading-yaml | Third Party Advisory |
Configurations
Information
Published : 2021-03-10 14:15
Updated : 2021-03-18 13:38
NVD link : CVE-2021-21371
Mitre link : CVE-2021-21371
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
tenable
- jira_cloud