CVE-2017-16763: Command Injection
(updated )
Due to the user-specific configuration being loaded from ~/.confire.yaml
using the yaml.load
function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
References
Detect and mitigate CVE-2017-16763 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →