First published: Fri May 22 2020(Updated: )
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Jw.util | <2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13388 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2020-13388, upgrade the jw.util package to version 2.3 or later, which implements safe YAML loading.
CVE-2020-13388 allows attackers to execute arbitrary Python code through insecure loading of YAML configurations.
CVE-2020-13388 affects users of jw.util package versions prior to 2.3 in Python applications.
Exploiting CVE-2020-13388 can lead to OS command execution, allowing attackers to gain control over the affected system.