CVE-2019-20477: Deserialization of Untrusted Data in PyYAML
(updated )
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
References
- github.com/advisories/GHSA-3pqx-4fqf-j49f
- github.com/pypa/advisory-database/tree/main/vulns/pyyaml/PYSEC-2020-176.yaml
- github.com/yaml/pyyaml
- github.com/yaml/pyyaml/blob/master/CHANGES
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H
- nvd.nist.gov/vuln/detail/CVE-2019-20477
- www.exploit-db.com/download/47655
Detect and mitigate CVE-2019-20477 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →