An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
422 | CVE-2017-16561 | 관리자 | 2017.11.09 | 43 |
421 | CVE-2017-16642 | 관리자 | 2017.11.09 | 27 |
420 | CVE-2008-7319 | 관리자 | 2017.11.09 | 18 |
419 | CVE-2016-0872 | 관리자 | 2017.11.09 | 19 |
418 | CVE-2017-16641 | 관리자 | 2017.11.09 | 36 |
417 | CVE-2017-2922 | 관리자 | 2017.11.09 | 22 |
416 | CVE-2017-2916 | 관리자 | 2017.11.09 | 23 |
415 | CVE-2017-2921 | 관리자 | 2017.11.09 | 22 |
414 | CVE-2017-2917 | 관리자 | 2017.11.09 | 26 |
413 | CVE-2017-2915 | 관리자 | 2017.11.09 | 24 |
412 | CVE-2017-2914 | 관리자 | 2017.11.09 | 25 |
411 | CVE-2017-2913 | 관리자 | 2017.11.09 | 23 |
410 | CVE-2017-12083 | 관리자 | 2017.11.09 | 23 |
409 | CVE-2017-2864 | 관리자 | 2017.11.09 | 21 |
408 | CVE-2017-2894 | 관리자 | 2017.11.09 | 48 |