CVE-2021-21371: Execution of untrusted code through config file
(updated )
It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.
References
- github.com/advisories/GHSA-8278-88vv-x98r
- github.com/pypa/advisory-database/tree/main/vulns/tenable-jira-cloud/PYSEC-2021-60.yaml
- github.com/tenable/integration-jira-cloud
- github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0
- github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r
- nvd.nist.gov/vuln/detail/CVE-2021-21371
- pypi.org/project/tenable-jira-cloud
Detect and mitigate CVE-2021-21371 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →