An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
347 | CVE-2018-1043 | 관리자 | 2018.01.25 | 11 |
346 | CVE-2017-18047 | 관리자 | 2018.01.25 | 11 |
345 | CVE-2018-5956 | 관리자 | 2018.01.25 | 11 |
344 | CVE-2017-15108 | 관리자 | 2018.01.25 | 11 |
343 | CVE-2017-14460 | 관리자 | 2018.01.25 | 11 |
342 | CVE-2017-12117 | 관리자 | 2018.01.25 | 11 |
341 | CVE-2017-12097 | 관리자 | 2018.01.25 | 11 |
340 | CVE-2017-16646 | 관리자 | 2017.11.09 | 11 |
339 | CVE-2017-16642 | 관리자 | 2017.11.09 | 11 |
338 | CVE-2017-2921 | 관리자 | 2017.11.09 | 11 |
337 | CVE-2017-2915 | 관리자 | 2017.11.09 | 11 |
336 | CVE-2017-2914 | 관리자 | 2017.11.09 | 11 |
335 | CVE-2017-2911 | 관리자 | 2017.11.09 | 11 |
334 | CVE-2017-2889 | 관리자 | 2017.11.09 | 11 |
333 | CVE-2017-14025 | 관리자 | 2017.11.09 | 11 |