Security Fix (yaml desearilization) in 17g#1
Security Fix (yaml desearilization) in 17g#1Asjidkalam wants to merge 1 commit into418sec:masterfrom
Conversation
|
👋 Hello, @clefebvre - @Asjidkalam has opened a PR to us with a fix for a potential vulnerability in your repository. To view the vulnerability, please refer to the bounty URL in the first comment, above. Ultimately, you get to decide if the fix is 👍 or 👎. If you are happy with the fix, please write a new comment ( If you have any questions or need support, come and join us on our community Discord! @clefebvre & @Asjidkalam - thank you for your efforts in securing the world’s open source code! 🎉 🔨 Want more security researchers protecting your repository? Stick our badge on your Copy this small code snippet and insert it into your
👇 👇 👇 |
📊 Metadata *
Insecure YAML deserialization
Bounty URL: https://www.huntr.dev/bounties/1-other-17g
⚙️ Description *
17gThis is read the only mirror, this package is vulnerable forArbitary Code Execution💻 Technical Description *
Vulnerable to YAML deserialization attack caused by unsafe loading.
🐛 Proof of Concept (PoC) *
python3 exp.pytest.yaml🔥 Proof of Fix (PoF) *
Used a safer loader(SafeLoader) instead of
FullLoader.The issue is fixed, and hence no code is executed.
👍 User Acceptance Testing (UAT)
All Ok, No breaking changes introduced. :)