OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.
www.openwall.com/lists/oss-security/2016/06/23/8
bugs.launchpad.net/murano/+bug/1586079
bugs.launchpad.net/python-muranoclient/+bug/1586078
github.com/openstack/murano
github.com/openstack/murano/blob/c898a310afbc27f12190446ef75d8b0bd12115eb/releasenotes/notes/safeloader-cve-2016-4972-19035a2a091ec30a.yaml
github.com/openstack/murano/blob/c898a310afbc27f12190446ef75d8b0bd12115eb/releasenotes/source/locale/en_GB/LC_MESSAGES/releasenotes.po
github.com/openstack/murano/commit/28de8c36c9dbe4aaf4d062e6fb6099afd437f49b
nvd.nist.gov/vuln/detail/CVE-2016-4972