CVE-2017-16618

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 82%
VendorProductVersion
owlmixin_projectowlmixin
𝑥
< 2.0.0
owlmixin_projectowlmixin
2.0.0:alpha1
owlmixin_projectowlmixin
2.0.0:alpha10
owlmixin_projectowlmixin
2.0.0:alpha11
owlmixin_projectowlmixin
2.0.0:alpha2
owlmixin_projectowlmixin
2.0.0:alpha3
owlmixin_projectowlmixin
2.0.0:alpha4
owlmixin_projectowlmixin
2.0.0:alpha5
owlmixin_projectowlmixin
2.0.0:alpha6
owlmixin_projectowlmixin
2.0.0:alpha7
owlmixin_projectowlmixin
2.0.0:alpha8
owlmixin_projectowlmixin
2.0.0:alpha9
𝑥
= Vulnerable software versions