Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk: High] arbitrary code execution (Due: 08/28/2020) #4525

Closed
1 of 2 tasks
jason-upchurch opened this issue Jul 29, 2020 · 1 comment
Closed
1 of 2 tasks

[Snyk: High] arbitrary code execution (Due: 08/28/2020) #4525

jason-upchurch opened this issue Jul 29, 2020 · 1 comment
Assignees
Labels
Security: high Remediate within 30 days
Milestone

Comments

@jason-upchurch
Copy link
Contributor

jason-upchurch commented Jul 29, 2020

User story

as a user of openFEC, I want vulnerabilities to be patched.
https://app.snyk.io/vuln/SNYK-PYTHON-PYYAML-590151

Summary

A vulnerability is introduced through apispec@0.39.0:

in PyYAML@5.3.1
introduced by apispec@0.39.0 > PyYAML@5.3.1 and 2 other path(s)
  No upgrade or patch available

Completion criteria:

  • Confirm this is a problem and if so, determine whether there is an upgrade and make that change
  • If it's a confirmed vulnerability and if no remediation is available notify security
@lbeaufort
Copy link
Member

lbeaufort commented Jul 30, 2020

Here's the PR I put in to apispec to use safe_load instead of load: marshmallow-code/apispec#281.

My assessment is that this isn't a vulnerability because:

So, closing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: high Remediate within 30 days
Projects
None yet
Development

No branches or pull requests

3 participants