Unsafe deserialization in confire
Critical severity
GitHub Reviewed
Published
Jul 18, 2018
to the GitHub Advisory Database
•
Updated Sep 13, 2024
Description
Published to the GitHub Advisory Database
Jul 18, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 13, 2024
An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
References