CVE-2021-24040 – parlai
Package
Manager: pip
Name: parlai
Vulnerable Version: >=0 <1.1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.31816 pctl0.96667
Details
Deserialization of Untrusted Data in ParlAI Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
Metadata
Created: 2021-09-13T20:06:14Z
Modified: 2021-09-13T19:29:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-mwgj-7x7j-6966/GHSA-mwgj-7x7j-6966.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-mwgj-7x7j-6966
Finding: F096
Auto approve: 1