1 results (0.001 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

The from_yaml method in serializers.py in Django Tastypie before 0.9.10 does not properly deserialize YAML data, which allows remote attackers to execute arbitrary Python code via vectors related to the yaml.load method. El método from_yaml en serializers.py en Django Tastypie anterior a 0.9.10 no deserializa debidamente los datos YAML, lo que permite a atacantes remotos ejecutar código Python arbitrario a través de vectores relacionados con el método yaml.load. • http://www.openwall.com/lists/oss-security/2011/11/02/1 http://www.openwall.com/lists/oss-security/2011/11/02/7 https://github.com/toastdriven/django-tastypie/commit/e8af315211b07c8f48f32a063233cc3f76dd5bc2 https://groups.google.com/forum/#%21topic/django-tastypie/i2aNGDHTUBI https://www.djangoproject.com/weblog/2011/nov/01/piston-and-tastypie-security-releases • CWE-20: Improper Input Validation •