Deserialization of Untrusted Data in parlai
Moderate severity
GitHub Reviewed
Published
Sep 10, 2021
in
facebookresearch/ParlAI
•
Updated Oct 9, 2024
Description
Published by the National Vulnerability Database
Sep 10, 2021
Reviewed
Sep 13, 2021
Published to the GitHub Advisory Database
Sep 13, 2021
Last updated
Oct 9, 2024
Impact
Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.
Patches
The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.
References
References