CRITICAL · 9.8

CVE-2020-1747

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method o...

Vulnerability Description

A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
PyyamlPyyaml>= 5.1, < 5.3.1
FedoraprojectFedora30
OpensuseLeap15.1
OracleCommunications Cloud Native Core Network Function Cloud Native Environment22.1.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-1747?

CVE-2020-1747 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method o...

How severe is CVE-2020-1747?

CVE-2020-1747 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2020-1747?

Check the references section above for vendor advisories and patch information. Affected products include: Pyyaml Pyyaml, Fedoraproject Fedora, Opensuse Leap, Oracle Communications Cloud Native Core Network Function Cloud Native Environment.