9.8

CVE-2017-16618

Exploit
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Owlmixin ProjectOwlmixin Version < 2.0.0
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha1
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha10
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha11
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha2
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha3
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha4
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha5
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha6
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha7
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha8
Owlmixin ProjectOwlmixin Version2.0.0 Updatealpha9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.02% 0.83
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
Es wurden noch keine Informationen zu CWE veröffentlicht.