9.8
CVSSv3

CVE-2021-27213

Published: 14/02/2021 Updated: 18/02/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

config.py in pystemon prior to 2021-02-13 allows code execution via YAML deserialization because SafeLoader and safe_load are not used.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pystemon project pystemon

Recent Articles

Sneaky Python package security fixes help no one – except miscreants
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Good thing these eggheads have created a database of patches

Python security fixes often happen through "silent" code commits, without an associated Common Vulnerabilities and Exposures (CVE) identifier, according to a group of computer security researchers. That's not ideal, they say, because attackers love to exploit undisclosed vulnerabilities in unpatched systems and because developers who are not security experts may not recognize that an upstream commit is targeting an exploitable flaw that's relevant to their code. Ergo, a Python package could have...