Description
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-0094 | An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used. |
Github GHSA |
GHSA-h72c-w3q3-55qq | OS Command Injection in jw.util |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:18:17.810Z
Reserved: 2020-05-22T00:00:00.000Z
Link: CVE-2020-13388
No data.
Status : Modified
Published: 2020-05-22T17:15:10.957
Modified: 2024-11-21T05:01:09.503
Link: CVE-2020-13388
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA