An exploitable vulnerability exists in the YAML parsing functionality in the parse_yaml_query method in parser.py in MLAlchemy before 0.2.2. When processing YAML-Based queries for data, a YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16615
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
197 | CVE-2017-6558 | 관리자 | 2017.03.10 | 9 |
196 | CVE-2016-6993 | 관리자 | 2016.10.14 | 9 |
195 | CVE-2016-3232 | 관리자 | 2016.06.17 | 9 |
194 | CVE-2016-3226 | 관리자 | 2016.06.17 | 9 |
193 | CVE-2016-3213 | 관리자 | 2016.06.17 | 9 |
192 | CVE-2016-0028 | 관리자 | 2016.06.17 | 9 |
191 | CVE-2018-5961 | 관리자 | 2018.01.25 | 8 |
190 | CVE-2017-12130 | 관리자 | 2018.01.25 | 8 |
189 | CVE-2017-14803 | 관리자 | 2018.01.25 | 8 |
188 | CVE-2017-15111 | 관리자 | 2018.01.25 | 8 |
187 | CVE-2017-15112 | 관리자 | 2018.01.25 | 8 |
186 | CVE-2017-12118 | 관리자 | 2018.01.25 | 8 |
185 | CVE-2017-14082 | 관리자 | 2018.01.25 | 8 |
184 | CVE-2015-6926 | 관리자 | 2018.01.25 | 8 |
183 | CVE-2008-7319 | 관리자 | 2017.11.09 | 8 |