Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0165 parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Github GHSA Github GHSA GHSA-mwgj-7x7j-6966 Deserialization of Untrusted Data in ParlAI
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: facebook

Published:

Updated: 2024-08-03T19:21:17.219Z

Reserved: 2021-01-13T00:00:00

Link: CVE-2021-24040

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-10T22:15:07.443

Modified: 2024-11-21T05:52:15.743

Link: CVE-2021-24040

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.