ID CVE-2017-16616
Summary An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.8:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.8:*:*:*:*:*:*:*
  • cpe:2.3:a:pyanyapi_project:pyanyapi:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:pyanyapi_project:pyanyapi:0.6.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm
misc https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16616-yamlparser-in-pyanyapi/
Last major update 03-10-2019 - 00:03
Published 08-11-2017 - 03:29
Last modified 03-10-2019 - 00:03
Back to Top