First published: Mon Sep 26 2022(Updated: )
The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
pip/joblib | <1.2.0 | 1.2.0 |
Joblib | <1.1.1 | |
Fedora | =36 | |
Fedora | =37 | |
Debian | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21797 is classified as a high severity vulnerability due to the risk of arbitrary code execution.
To fix CVE-2022-21797, upgrade the joblib package to version 1.2.0 or higher.
CVE-2022-21797 affects joblib versions from 0 to 1.1.1, specifically those installed via pip and certain Linux distributions like Fedora and Debian.
CVE-2022-21797 is an arbitrary code execution vulnerability caused by the misuse of the eval() function in the joblib library.
Yes, CVE-2022-21797 can be exploited remotely if an attacker can control the input parameters sent to the affected joblib function.