CVE-2016-4972 – python-muranoclient
Package
Manager: pip
Name: python-muranoclient
Vulnerable Version: >=0 <0.7.3 || >=0.8.0 <0.8.5
Severity
Level: Critical
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.03928 pctl0.87858
Details
OpenStack Murano Code Execution OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), and python-muranoclient before 0.7.3 (liberty) and 0.8.x before 0.8.5 (mitaka) improperly use loaders inherited from yaml.Loader when parsing MuranoPL and UI files, which allows remote attackers to create arbitrary Python objects and execute arbitrary code via crafted extended YAML tags in UI definitions in packages.
Metadata
Created: 2022-05-17T03:48:22Z
Modified: 2024-10-25T20:43:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-87r7-q54j-f9qg/GHSA-87r7-q54j-f9qg.json
CWE IDs: ["CWE-20"]
Alternative ID: GHSA-87r7-q54j-f9qg
Finding: F184
Auto approve: 1