Vulnerability Description
An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pyanyapi Project | Pyanyapi | < 0.6.1 |
References
- https://github.com/Stranger6667/pyanyapi/issues/41Issue Tracking
- https://github.com/Stranger6667/pyanyapi/releases/tag/0.6.1Release Notes
- https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparseThird Party Advisory
- https://pypi.python.org/pypi/pyanyapi/0.6.1Product
- https://github.com/Stranger6667/pyanyapi/issues/41Issue Tracking
- https://github.com/Stranger6667/pyanyapi/releases/tag/0.6.1Release Notes
- https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparseThird Party Advisory
- https://pypi.python.org/pypi/pyanyapi/0.6.1Product
FAQ
What is CVE-2017-16616?
CVE-2017-16616 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting ...
How severe is CVE-2017-16616?
CVE-2017-16616 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-16616?
Check the references section above for vendor advisories and patch information. Affected products include: Pyanyapi Project Pyanyapi.