First published: Wed Jul 22 2020(Updated: )
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-pyyaml | <0:5.4.1-1.el7 | 0:5.4.1-1.el7 |
redhat/PyYAML | <5.4 | 5.4 |
Pyyaml Pyyaml | >=5.1<5.4 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =1.10.0 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =22.1.0 | |
pip/PyYAML | <5.4 | 5.4 |
Use `yaml.safe_load` or the SafeLoader loader when you parse untrusted input.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14343 is a vulnerability in the PyYAML library that allows arbitrary code execution.
The severity of CVE-2020-14343 is critical with a CVSS score of 9.8.
Versions before 5.4 of the PyYAML library, PyYAML package 5.4, python-pyyaml package up to 0:5.4.1-1.el7, and certain versions of Oracle Communications Cloud Native Core Network Function Cloud Native Environment are affected by CVE-2020-14343.
Update the PyYAML library or the affected software to version 5.4 or higher.
You can find more information about CVE-2020-14343 on the NIST National Vulnerability Database (NVD), GitHub, and Red Hat Bugzilla.