CVE-2017-18342 — Deserialization of Untrusted Data in Pyyaml
Severity
9.8CRITICALNVD
EPSS
4.5%
top 10.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 27
Latest updateFeb 14
Description
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages4 packages
Also affects: Fedora 28, 29, 30
Patches
🔴Vulnerability Details
6📋Vendor Advisories
4Debian▶
CVE-2017-18342: pyyaml - In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used w...↗2017
💬Community
5Bugzilla▶
CVE-2019-20477 PyYAML: command execution through python/object/apply constructor in FullLoader↗2020-02-21
Bugzilla▶
CVE-2017-18342 python3-PyYAML: PyYAML: yaml.load() API could execute arbitrary code [epel-all]↗2018-06-27
Bugzilla▶
CVE-2017-18342 python2-pyyaml: PyYAML: yaml.load() API could execute arbitrary code [epel-all]↗2018-06-27
Bugzilla
▶