Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SPHX-FOSS-CRITICAL-Arbitrary Code Execution #37

Open
IKarasynskyi-SPD opened this issue Apr 28, 2023 · 0 comments
Open

SPHX-FOSS-CRITICAL-Arbitrary Code Execution #37

IKarasynskyi-SPD opened this issue Apr 28, 2023 · 0 comments

Comments

@IKarasynskyi-SPD
Copy link

Info

Application: New App Test
Component: New App Test Component
Build file: Security-Phoenix-demo/vulnerablecode:requirements.txt
url: https://snyk.io/vuln/SNYK-PYTHON-PYYAML-590151
isIgnored: false
isPatched: false
isPinnable: true
isPatchable: false
pkgVersions: 5.3.1
disclosureTime: 2020-07-22T00:00:00Z
exploitMaturity: mature
publicationTime: 2020-07-26T13:45:01Z
isPartiallyFixable: true

Details

Overview

Affected versions of this package are vulnerable to Arbitrary Code Execution. It processes untrusted YAML files through the full_load method or with the FullLoader loader. This is due to an incomplete fix for CVE-2020-1747.

Remediation

Upgrade PyYAML to version 5.4 or higher.

References

Risk Context

This vulnerability's risk is Critical because the base severity is High
with a CVSS value of 9, the probability of exploitation in the wild is Low and it is visible externally.
The SLA for this vulnerability is above the organization tolerance.

Link to vulnerability

Created by Phoenix Security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant