autogluon.multimodal vulnerable to unsafe YAML deserialization
Package
Affected versions
>= 0.4.0, < 0.4.3
>= 0.5.0, < 0.5.2
Patched versions
0.4.3
0.5.2
Description
Published to the GitHub Advisory Database
Sep 21, 2022
Reviewed
Sep 21, 2022
Last updated
Jan 7, 2023
Impact
A potential unsafe deserialization issue exists within the
autogluon.multimodalmodule, where YAML files are loaded viayaml.load()instead ofyaml.safe_load(). The deserialization of untrusted data may allow an unprivileged third party to cause remote code execution, denial of service, and impact to both confidentiality and integrity.Impacted versions:
>=0.4.0;<0.4.3,>=0.5.0;<0.5.2.Patches
The patches are included in
autogluon.multimodal==0.4.3,autogluon.multimodal==0.5.2and Deep Learning Containers0.4.3and0.5.2.Workarounds
Do not load data which originated from an untrusted source, or that could have been tampered with. Only load data you trust.
References
References