Arbitrary Code Execution via YAML Deserialization in Django Piston

Arbitrary Code Execution via YAML Deserialization in Django Piston

CVE-2011-4103 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

emitters.py in Django Piston before 0.2.3 and 0.2.x before 0.2.2.1 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Learn more about our Web Application Penetration Testing UK.