pyyaml@5.1.1 vulnerabilities

YAML parser and emitter for Python

Direct Vulnerabilities

Known vulnerabilities in the pyyaml package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution. It processes untrusted YAML files through the full_load method or with the FullLoader loader. This is due to an incomplete fix for CVE-2020-1747.

How to fix Arbitrary Code Execution?

Upgrade PyYAML to version 5.4 or higher.

[5.1b1,5.4)
  • C
Arbitrary Code Execution

Affected versions of this package are vulnerable to Arbitrary Code Execution. It is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.

How to fix Arbitrary Code Execution?

Upgrade PyYAML to version 5.3.1 or higher.

[5.1b1,5.3.1)
  • C
Improper Access Control

Affected versions of this package are vulnerable to Improper Access Control. It has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module.

How to fix Improper Access Control?

Upgrade PyYAML to version 5.2 or higher.

[5.1,5.2)