First published: Wed Jun 14 2017(Updated: )
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/tablib | <0.11.5 | 0.11.5 |
Tablib | =0.11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2810 is rated as high severity due to its ability to execute arbitrary python commands through a loaded yaml file.
CVE-2017-2810 allows command execution by allowing an attacker to insert malicious python code into the yaml data loaded into a Databook.
CVE-2017-2810 specifically affects Tablib version 0.11.4.
To mitigate risks from CVE-2017-2810, avoid using Tablib version 0.11.4 and update to a patched version.
Yes, a patch addressing CVE-2017-2810 is available in later versions of Tablib.