Deserialization of Untrusted Data in PyDrive2 - CVE-2023-49297
Published: December 13, 2023
PyDrive2
Iterative Research Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can trick the victim to load a specially crafted YAML file and execute arbitrary code on the system.
Successful exploitation of the vulnerability requires that PyDrive2 is run in the same directory as the malicious YAML file or if it is loaded in via LoadSettingsFile.