CVE-2017-2810: Loaded Databook of Tablib prone to python insertion resulting in command execution
(updated )
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
References
- github.com/advisories/GHSA-gcr6-rf47-jrgf
- github.com/jazzband/tablib
- github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e
- github.com/pypa/advisory-database/tree/main/vulns/tablib/PYSEC-2017-95.yaml
- nvd.nist.gov/vuln/detail/CVE-2017-2810
- security.gentoo.org/glsa/201811-18
- talosintelligence.com/vulnerability_reports/TALOS-2017-0307
Detect and mitigate CVE-2017-2810 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →