1 results (0.002 seconds)
CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

CVE-2023-49297 – Unsafe YAML deserialization in PyDrive2
https://notcve.org/view.php?id=CVE-2023-49297
05 Dec 2023 — PyDrive2 is a wrapper library of google-api-python-client that simplifies many common Google Drive API V2 tasks. Unsafe YAML deserilization will result in arbitrary code execution. A maliciously crafted YAML file can cause arbitrary code execution if PyDrive2 is run in the same directory as it, or if it is loaded in via `LoadSettingsFile`. This is a deserilization attack that will affect any user who initializes GoogleAuth from this package while a malicious yaml file is present in the same directory. This ... • https://github.com/iterative/PyDrive2/commit/c57355dc2033ad90b7050d681b2c3ba548ff0004 • CWE-502: Deserialization of Untrusted Data •