NVFLARE, versions prior to 2.1.2, contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0167 NVFLARE, versions prior to 2.1.2, contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
Github GHSA Github GHSA GHSA-hrf3-622q-8366 Unsafe yaml deserialization in NVFlare
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: nvidia

Published:

Updated: 2024-08-03T07:26:00.993Z

Reserved: 2022-05-24T00:00:00

Link: CVE-2022-31605

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-01T18:15:08.837

Modified: 2024-11-21T07:04:50.067

Link: CVE-2022-31605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.