First published: Fri Sep 10 2021(Updated: )
parlai is a framework for training and evaluating AI models on a variety of openly available dialogue datasets. In affected versions the package is vulnerable to YAML deserialization attack caused by unsafe loading which leads to Arbitary code execution. This security bug is patched by avoiding unsafe loader users should update to version above v1.1.0. If upgrading is not possible then users can change the Loader used to SafeLoader as a workaround. See commit 507d066ef432ea27d3e201da08009872a2f37725 for details.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook Parlai | <1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39207 is a vulnerability in the Parlai framework that allows for YAML deserialization attack leading to arbitrary code execution.
CVE-2021-39207 has a severity rating of 8.8 (high).
CVE-2021-39207 affects the Parlai package versions up to exclusive 1.1.0.
CVE-2021-39207 is patched by avoiding unsafe YAML loading in the Parlai package.
CVE-2021-39207 is associated with the CWE ID 502.