Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03YzRoLXc3NjUtNnB3Z84AAW2I
OISF suricata-update unsafely deserializes YAML data
Suricata-Update uses the insecure yaml.load()
function. Code will be executed if the yaml-file contains lines like:
hello: !!python/object/apply:os.system ['ls -l > /tmp/output']
The vulnerable function can be triggered by "suricata-update list-sources". The locally stored index.yaml will be loaded in this function and the malicious code gets executed.
Permalink: https://github.com/advisories/GHSA-7c4h-w765-6pwgJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03YzRoLXc3NjUtNnB3Z84AAW2I
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 5 months ago
CVSS Score: 7.8
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-7c4h-w765-6pwg, CVE-2018-1000167
References:
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000167
- https://redmine.openinfosecfoundation.org/issues/2359
- https://tech.feedyourhead.at/content/remote-code-execution-in-suricata-update
- https://github.com/OISF/suricata-update/pull/23
- https://github.com/OISF/suricata-update/commit/76270e73128ca1299b4e33e7e2a74ac3d963a97a
- https://github.com/advisories/GHSA-7c4h-w765-6pwg
Blast Radius: 4.7
Affected Packages
pypi:suricata-update
Dependent packages: 0Dependent repositories: 4
Downloads: 2,235 last month
Affected Version Ranges: <= 1.0.0a1
Fixed in: 1.0.0b1
All affected versions: 1.0.0-a1
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.1.0, 1.2.1, 1.2.2, 1.2.6