Arbitrary Code Execution via YAML Configuration Loading in jw.util Package

Arbitrary Code Execution via YAML Configuration Loading in jw.util Package

CVE-2020-13388 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.

Learn more about our Web Application Penetration Testing UK.