First published: Mon Oct 27 2014(Updated: )
The `from_yaml` method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/django-tastypie | <0.9.10 | 0.9.10 |
Djangoproject Tastypie | <=0.9.9 |
https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.