An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:18:17.810Z
Reserved: 2020-05-22T00:00:00
Link: CVE-2020-13388

No data.

Status : Modified
Published: 2020-05-22T17:15:10.957
Modified: 2024-11-21T05:01:09.503
Link: CVE-2020-13388

No data.