Arbitrary Code Execution Affecting python-muranoclient package, versions [,0.7.3)[0.8,0.8.5)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.88% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-PYTHONMURANOCLIENT-40398
  • published1 Aug 2017
  • disclosed10 Aug 2016
  • creditUnknown

Introduced: 10 Aug 2016

CVE-2016-4972  (opens in a new tab)
CWE-20  (opens in a new tab)

Overview

python-muranoclient is a client library for Murano built on the Murano API.

OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.

References

CVSS Scores

version 3.1