An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16618
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16618
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
167 | CVE-2017-2881 | 관리자 | 2017.11.09 | 12 |
166 | CVE-2017-2898 | 관리자 | 2017.11.09 | 13 |
165 | CVE-2017-2894 | 관리자 | 2017.11.09 | 8 |
164 | CVE-2017-2864 | 관리자 | 2017.11.09 | 9 |
163 | CVE-2017-12083 | 관리자 | 2017.11.09 | 7 |
162 | CVE-2017-2913 | 관리자 | 2017.11.09 | 8 |
161 | CVE-2017-2914 | 관리자 | 2017.11.09 | 10 |
160 | CVE-2017-2915 | 관리자 | 2017.11.09 | 11 |
159 | CVE-2017-2917 | 관리자 | 2017.11.09 | 14 |
158 | CVE-2017-2921 | 관리자 | 2017.11.09 | 11 |
157 | CVE-2017-2916 | 관리자 | 2017.11.09 | 7 |
156 | CVE-2017-2922 | 관리자 | 2017.11.09 | 9 |
155 | CVE-2017-16641 | 관리자 | 2017.11.09 | 10 |
154 | CVE-2016-0872 | 관리자 | 2017.11.09 | 9 |
153 | CVE-2008-7319 | 관리자 | 2017.11.09 | 8 |