CVE-2017-16618
08.11.2017, 03:29
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.Enginsight
Vendor | Product | Version |
---|---|---|
owlmixin_project | owlmixin | 𝑥 < 2.0.0 |
owlmixin_project | owlmixin | 2.0.0:alpha1 |
owlmixin_project | owlmixin | 2.0.0:alpha10 |
owlmixin_project | owlmixin | 2.0.0:alpha11 |
owlmixin_project | owlmixin | 2.0.0:alpha2 |
owlmixin_project | owlmixin | 2.0.0:alpha3 |
owlmixin_project | owlmixin | 2.0.0:alpha4 |
owlmixin_project | owlmixin | 2.0.0:alpha5 |
owlmixin_project | owlmixin | 2.0.0:alpha6 |
owlmixin_project | owlmixin | 2.0.0:alpha7 |
owlmixin_project | owlmixin | 2.0.0:alpha8 |
owlmixin_project | owlmixin | 2.0.0:alpha9 |
𝑥
= Vulnerable software versions
References