First published: Wed Mar 10 2021(Updated: )
### Impact It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. ### Workarounds Manually adjust yaml.load() to yaml.safe_load() ### For more information If you have any questions or comments about this advisory: * Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues) * Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tenable Jira Cloud | <1.1.21 | |
pip/tenable-jira-cloud | <1.1.21 | 1.1.21 |
https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21371 is a vulnerability in Tenable for Jira Cloud that allows arbitrary code execution.
CVE-2021-21371 has a severity score of 8.6, which is considered high.
Tenable Jira Cloud versions up to but not including 1.1.21 are affected by CVE-2021-21371.
To fix CVE-2021-21371, update your Tenable Jira Cloud installation to a version higher than 1.1.21.
You can find more information about CVE-2021-21371 on the GitHub page of Tenable for Jira Cloud and the PyPI page of tenable-jira-cloud.