Vulnerability Details CVE-2017-16616
An exploitable vulnerability exists in the YAML parsing functionality in the YAMLParser method in Interfaces.py in PyAnyAPI before 0.6.1. A YAML parser can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 78.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-16616
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.1
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.2
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.2.1
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.3
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.4
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.1
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.2
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.3
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.4
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.5
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.6
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.7
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.5.8
-
cpe:2.3:a:pyanyapi_project:pyanyapi:0.6.0