#VU25823 Input validation error in PyYAML - CVE-2020-1747
Published: March 9, 2020 / Updated: July 15, 2020
PyYAML
The YAML Project
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insufficient validation of user-supplied input when processing untrusted YAML files passed via the "full_load" method or with the "FullLoader" loader. A remote attacker can pass specially crafted input to the application and execute arbitrary code by abusing the python/object/new constructor.