logo

CVE-2011-4104 django-tastypie

Package

Manager: pip
Name: django-tastypie
Vulnerable Version: >=0 <0.9.10

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00821 pctl0.73533

Details

Django Tastypie Improper Deserialization of YAML Data The `from_yaml` method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method.

Metadata

Created: 2022-05-14T03:08:09Z
Modified: 2024-09-16T22:12:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qgvw-qc2q-gv5q/GHSA-qgvw-qc2q-gv5q.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-qgvw-qc2q-gv5q
Finding: F096
Auto approve: 1