Execution of untrusted code through config file
Moderate severity
GitHub Reviewed
Published
Mar 6, 2021
in
tenable/integration-jira-cloud
•
Updated Oct 27, 2024
Description
Reviewed
Mar 10, 2021
Published to the GitHub Advisory Database
Mar 10, 2021
Published by the National Vulnerability Database
Mar 10, 2021
Last updated
Oct 27, 2024
Impact
It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.
Workarounds
Manually adjust yaml.load() to yaml.safe_load()
For more information
If you have any questions or comments about this advisory:
References