pyyaml@3.13rc1 vulnerabilities

YAML parser and emitter for Python

Direct Vulnerabilities

Known vulnerabilities in the pyyaml package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution. It processes untrusted YAML files through the full_load method or with the FullLoader loader. This is due to an incomplete fix for CVE-2020-1747.

How to fix Arbitrary Code Execution?

Upgrade PyYAML to version 5.4 or higher.

[0,5.4)
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution. It is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

How to fix Arbitrary Code Execution?

Upgrade PyYAML to version 5.3.1 or higher.

[0,5.3.1)
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution due to using the insecure yaml.load() function.

How to fix Arbitrary Code Execution?

Upgrade PyYAML to version 4.2b1 or higher.

(,4.2b1)