First published: Wed Jun 27 2018(Updated: )
In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pyyaml | <4.1 | 4.1 |
redhat/PyYAML | <5.1 | 5.1 |
Pyyaml Pyyaml | <5.1 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.4 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.1.0<=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18342 is a vulnerability in PyYAML that allows arbitrary code execution.
CVE-2017-18342 has a severity rating of 9.8, which is considered critical.
Versions up to and including 4.1 of PyYAML are affected by CVE-2017-18342.
To fix CVE-2017-18342, you should upgrade to version 5.1 or newer of PyYAML.
You can find more information about CVE-2017-18342 at the following references: [link1], [link2], [link3].