First published: Fri May 22 2020(Updated: )
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Python Jw.util | <2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.