View all vulnerabilities

CVE-2017-18342

PyYAML insecurely deserializes YAML strings leading to arbitrary code execution

Description

In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
Score Vector
Affected Versions
Severity
Ecosystem
RPM
Publish Date
June 27, 2018
Modified Date
November 7, 2023