An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0094 | An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used. |
Github GHSA |
GHSA-h72c-w3q3-55qq | OS Command Injection in jw.util |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:18:17.810Z
Reserved: 2020-05-22T00:00:00
Link: CVE-2020-13388
No data.
Status : Modified
Published: 2020-05-22T17:15:10.957
Modified: 2024-11-21T05:01:09.503
Link: CVE-2020-13388
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA