First published: Fri Sep 10 2021(Updated: )
### Impact Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. ### Patches The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls. ### References - https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 - https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 - https://anon-artist.github.io/blogs/blog3.html
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook Parlai | <1.1.0 | |
pip/parlai | <1.1.0 | 1.1.0 |
<1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39207 is a vulnerability in the Parlai framework that allows for YAML deserialization attack leading to arbitrary code execution.
CVE-2021-39207 has a severity rating of 8.8 (high).
CVE-2021-39207 affects the Parlai package versions up to exclusive 1.1.0.
CVE-2021-39207 is patched by avoiding unsafe YAML loading in the Parlai package.
CVE-2021-39207 is associated with the CWE ID 502.