CVE-2021-21371: Deserialization of Untrusted Data
(updated )
In tenable-jira-cloud, it is possible to run arbitrary commands through the yaml.load()
method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed by using yaml.safe_load()
instead of yaml.load()
.
References
Detect and mitigate CVE-2021-21371 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →