autogluon.multimodal vulnerable to unsafe YAML deserialization
Package
Affected versions
>= 0.4.0, < 0.4.3
>= 0.5.0, < 0.5.2
Patched versions
0.4.3
0.5.2
Description
Published to the GitHub Advisory Database
Sep 21, 2022
Reviewed
Sep 21, 2022
Last updated
Jan 7, 2023
Impact
A potential unsafe deserialization issue exists within the
autogluon.multimodal
module, where YAML files are loaded viayaml.load()
instead ofyaml.safe_load()
. The deserialization of untrusted data may allow an unprivileged third party to cause remote code execution, denial of service, and impact to both confidentiality and integrity.Impacted versions:
>=0.4.0;<0.4.3
,>=0.5.0;<0.5.2
.Patches
The patches are included in
autogluon.multimodal==0.4.3
,autogluon.multimodal==0.5.2
and Deep Learning Containers0.4.3
and0.5.2
.Workarounds
Do not load data which originated from an untrusted source, or that could have been tampered with. Only load data you trust.
References
References