Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Command execution through python/object/apply constructor in FullLoader in PyYaml #92

Closed
3 tasks done
darunesh-RH opened this issue Apr 17, 2020 · 2 comments
Closed
3 tasks done
Labels
talk-proposal New talk of Python Pune meetup

Comments

@darunesh-RH
Copy link

darunesh-RH commented Apr 17, 2020

Title of the talk

Exploiting and understanding CVE-2019-20477.

Description

PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2019-20477

Duration (including Q&A)

30-45 mins

Prerequisites

What is CVE and vulnerability?

Checklist

The talk/workshop speaker agrees to,

@darunesh-RH darunesh-RH added the talk-proposal New talk of Python Pune meetup label Apr 17, 2020
@bhavin192
Copy link
Contributor

Hello @darunesh-RH, this is indeed an unique and interesting talk. This has been scheduled here, https://www.meetup.com/PythonPune/events/270019437/ .

@bhavin192 bhavin192 added the scheduled The scheduled talks label Apr 21, 2020
@bhavin192
Copy link
Contributor

Hey @darunesh-RH can you please share your slides?

@bhavin192 bhavin192 added the talk-proposal New talk of Python Pune meetup label Jan 22, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
talk-proposal New talk of Python Pune meetup
Projects
None yet
Development

No branches or pull requests

2 participants