OS Command Injection in jw.util
Critical severity
GitHub Reviewed
Published
Jun 2, 2021
to the GitHub Advisory Database
•
Updated Mar 3, 2023
Description
Published by the National Vulnerability Database
May 22, 2020
Reviewed
May 14, 2021
Published to the GitHub Advisory Database
Jun 2, 2021
Last updated
Mar 3, 2023
An exploitable vulnerability exists in the configuration-loading functionality of the jw.util package before 2.3 for Python. When loading a configuration with FromString or FromStream with YAML, one can execute arbitrary Python code, resulting in OS command execution, because safe_load is not used.
References