TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-1747

CRITICAL
9.8

Beschreibung

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht3/24/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

fedoraproject:fedoraopensuse:leaporacle:communications_cloud_native_core_network_function_cloud_native_environmentpyyaml:pyyaml

Schwachen (CWE)

CWE-20CWE-20

Referenzen

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/yaml/pyyaml/pull/386(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.