TROYANOSYVIRUS
Back to CVEs

CVE-2020-1747

CRITICAL
9.8

Description

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/24/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

fedoraproject:fedoraopensuse:leaporacle:communications_cloud_native_core_network_function_cloud_native_environmentpyyaml:pyyaml

Weaknesses (CWE)

CWE-20CWE-20

References

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/yaml/pyyaml/pull/386(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2022.html(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.