Skip to content
This repository has been archived by the owner on Nov 3, 2023. It is now read-only.

Deserialization of Untrusted Data in parlai

Moderate
jurajh-fb published GHSA-m87f-9fvv-2mgg Sep 10, 2021

Package

pip parlai (pip)

Affected versions

< 1.1.0

Patched versions

>= 1.1.0

Description

Impact

Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.

Patches

The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.

References

Severity

Moderate

CVE ID

CVE-2021-24040

Weaknesses

Credits