First published: Fri Sep 10 2021(Updated: )
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
Credit: cve-assign@fb.com cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook Parlai | <1.1.0 | |
pip/parlai | <1.1.0 | 1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24040 is a vulnerability in ParlAI prior to v1.1.0 that allows an attacker to execute remote code or similar risks by providing malicious input through local YAML configuration files.
CVE-2021-24040 affects ParlAI versions prior to v1.1.0.
The severity of CVE-2021-24040 is critical with a CVSS score of 9.8.
An attacker with the ability to modify local YAML configuration files can exploit CVE-2021-24040 by providing malicious input, which can lead to remote code execution or similar risks.
Yes, the fix for CVE-2021-24040 is to update ParlAI to version 1.1.0 or later.