An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
437 | CVE-2017-12709 | 관리자 | 2017.08.27 | 1 |
436 | CVE-2017-13697 | 관리자 | 2017.08.27 | 1 |
435 | CVE-2015-1395 | 관리자 | 2017.08.27 | 1 |
434 | CVE-2015-3206 | 관리자 | 2017.08.27 | 1 |
433 | CVE-2015-3211 | 관리자 | 2017.08.27 | 1 |
432 | CVE-2015-4017 | 관리자 | 2017.08.27 | 1 |
431 | CVE-2015-4181 | 관리자 | 2017.08.27 | 1 |
430 | CVE-2015-5701 | 관리자 | 2017.08.27 | 1 |
429 | CVE-2015-4180 | 관리자 | 2017.08.27 | 1 |
428 | CVE-2017-2894 | 관리자 | 2017.11.09 | 1 |
427 | CVE-2016-3199 | 관리자 | 2016.06.17 | 2 |
426 | CVE-2016-3201 | 관리자 | 2016.06.17 | 2 |
425 | CVE-2016-3211 | 관리자 | 2016.06.17 | 2 |
424 | CVE-2016-3218 | 관리자 | 2016.06.17 | 2 |
423 | CVE-2016-3222 | 관리자 | 2016.06.17 | 2 |