-
Notifications
You must be signed in to change notification settings - Fork 45
CVE-2020-1747 (High) detected in PyYAML-5.1.2.tar.gz #269
Comments
This issue/pull request has been marked as |
This issue/pull request has been marked as |
This issue/pull request has been marked as |
Duplicate of EOS-23696 |
. |
This bug is closing as duplicate of -> [EOS-23696] Upgrade PyYAML library from PyYAML-5.1.2.tar.gz to PyYAML 5.4.1 - JIRA NSS (seagate.com)
All the PyYAML library upgrade from 5.1.2 to 5.4.1 will be tracked thru -> [EOS-23696] Upgrade PyYAML library from PyYAML-5.1.2.tar.gz to PyYAML 5.4.1 - JIRA NSS (seagate.com) |
CVE-2020-1747 - High Severity Vulnerability
Vulnerable Library - PyYAML-5.1.2.tar.gz
YAML parser and emitter for Python
Library home page: https://files.pythonhosted.org/packages/e3/e8/b3212641ee2718d556df0f23f78de8303f068fe29cdaa7a91018849582fe/PyYAML-5.1.2.tar.gz
Path to dependency file: cortx-ha/jenkins/pyinstaller/v1/requirements.txt
Path to vulnerable library: cortx-ha/jenkins/pyinstaller/v1/requirements.txt,cortx-ha/jenkins/pyinstaller/v2/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 489a85b33aee06bc85dc7f2b7c71262cada47dd9
Found in base branch: main
Vulnerability Details
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
Publish Date: 2020-03-24
URL: CVE-2020-1747
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-6757-jp84-gxfx
Release Date: 2020-03-24
Fix Resolution: pyyaml - 5.3.1
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: