pyyaml@5.1 vulnerabilities

YAML parser and emitter for Python

  • latest version

    6.0.2

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    4 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the pyyaml package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution. It processes untrusted YAML files through the full_load method or with the FullLoader loader. This is due to an incomplete fix for CVE-2020-1747.

    How to fix Arbitrary Code Execution?

    Upgrade PyYAML to version 5.4 or higher.

    [5.1b1,5.4)
    • C
    Arbitrary Code Execution

    Affected versions of this package are vulnerable to Arbitrary Code Execution. It is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

    How to fix Arbitrary Code Execution?

    Upgrade PyYAML to version 5.3.1 or higher.

    [5.1b1,5.3.1)
    • C
    Improper Access Control

    Affected versions of this package are vulnerable to Improper Access Control. It has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module.

    How to fix Improper Access Control?

    Upgrade PyYAML to version 5.2 or higher.

    [5.1,5.2)