First published: Wed Feb 26 2020(Updated: )
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pyyaml Pyyaml | >=5.1<5.3.1 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
openSUSE Leap | =15.1 | |
Oracle Communications Cloud Native Core Network Function Cloud Native Environment | =22.1.0 | |
redhat/PyYAML | <5.3.1 | 5.3.1 |
pip/pyyaml | >=5.1b7<5.3.1 | 5.3.1 |
Use `yaml.safe_load` or the SafeLoader loader when you parse untrusted input.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1747 is a vulnerability in the PyYAML library that can allow a remote attacker to execute arbitrary code on the system.
CVE-2020-1747 has a severity level of critical.
CVE-2020-1747 affects PyYAML versions before 5.3.1.
An attacker can exploit CVE-2020-1747 by processing untrusted YAML files through the full_load method or with the FullLoader loader.
To fix CVE-2020-1747, update PyYAML to version 5.3.1 or later.