Deserialization of Untrusted Data in PyYAML
Critical severity
GitHub Reviewed
Published
Apr 20, 2021
to the GitHub Advisory Database
•
Updated Oct 25, 2024
Description
Published by the National Vulnerability Database
Feb 19, 2020
Reviewed
Apr 8, 2021
Published to the GitHub Advisory Database
Apr 20, 2021
Last updated
Oct 25, 2024
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
References