Arbitrary Command Execution in OwlMixin YAML Loading Functionality

Arbitrary Command Execution in OwlMixin YAML Loading Functionality

CVE-2017-16618 · HIGH Severity

AV:N/AC:L/AU:N/C:P/I:P/A:P

An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Learn more about our Web Application Penetration Testing UK.