Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-14343
HistoryFeb 09, 2021 - 12:00 a.m.

CVE-2020-14343

2021-02-0900:00:00
ubuntu.com
ubuntu.com
27

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

67.4%

A vulnerability was discovered in the PyYAML library in versions before
5.4, where it is susceptible to arbitrary code execution when it processes
untrusted YAML files through the full_load method or with the FullLoader
loader. Applications that use the library to process untrusted input may be
vulnerable to this flaw. This flaw allows an attacker to execute arbitrary
code on the system by abusing the python/object/new constructor. This flaw
is due to an incomplete fix for CVE-2020-1747.

Bugs

Notes

Author Note
sbeattie incomplete fix of CVE-2020-1747
mdeslaur FullLoader was introduced in 5.1. FullLoader should not be used on untrusted input.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchpyyaml< 5.3.1-1ubuntu0.1UNKNOWN
ubuntu20.10noarchpyyaml< 5.3.1-2ubuntu0.1UNKNOWN
ubuntu21.04noarchpyyaml< 5.3.1-3ubuntu1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.003 Low

EPSS

Percentile

67.4%