Description
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-0082 | An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A \"Load YAML\" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability. |
Github GHSA |
GHSA-ccmq-qvcp-5mrm | Unsafe deserialization in owlmixin |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:27:04.414Z
Reserved: 2017-11-06T00:00:00.000Z
Link: CVE-2017-16618
No data.
Status : Deferred
Published: 2017-11-08T03:29:00.277
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-16618
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA