An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T20:35:20.965Z

Reserved: 2017-11-10T00:00:00

Link: CVE-2017-16763

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-11-10T09:29:00.363

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-16763

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.