CVE-2021-21371 – tenable-jira-cloud
Package
Manager: pip
Name: tenable-jira-cloud
Vulnerable Version: >=0 <1.1.21
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00079 pctl0.24096
Details
Execution of untrusted code through config file ### Impact It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. ### Workarounds Manually adjust yaml.load() to yaml.safe_load() ### For more information If you have any questions or comments about this advisory: * Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues) * Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)
Metadata
Created: 2021-03-10T21:51:17Z
Modified: 2024-10-27T15:38:08Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/03/GHSA-8278-88vv-x98r/GHSA-8278-88vv-x98r.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-8278-88vv-x98r
Finding: F096
Auto approve: 1