Skip to content

sqla-yaml-fixtures is vulnerable to Code Injection

High severity GitHub Reviewed Published Jan 4, 2019 to the GitHub Advisory Database • Updated Aug 16, 2023

Package

pip sqla-yaml-fixtures (pip)

Affected versions

<= 0.9.1

Patched versions

None

Description

Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in sqla_yaml_fixtures.load.

References

Published to the GitHub Advisory Database Jan 4, 2019
Reviewed Jun 16, 2020
Last updated Aug 16, 2023

Severity

High
7.8
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2019-3575

GHSA ID

GHSA-2x54-j4m3-r6wx
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.