An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03YzRoLXc3NjUtNnB3Z84AAW2I

OISF suricata-update unsafely deserializes YAML data

Suricata-Update uses the insecure yaml.load() function. Code will be executed if the yaml-file contains lines like:

hello: !!python/object/apply:os.system ['ls -l > /tmp/output']

The vulnerable function can be triggered by "suricata-update list-sources". The locally stored index.yaml will be loaded in this function and the malicious code gets executed.

Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: about 2 months ago

CVSS Score: 7.8
CVSS vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-7c4h-w765-6pwg, CVE-2018-1000167
References: Repository:
Blast Radius: 4.7

Affected Packages

Dependent packages: 0
Dependent repositories: 4
Downloads: 2,142 last month
Affected Version Ranges: <= 1.0.0a1
Fixed in: 1.0.0b1
All affected versions: 1.0.0-a1
All unaffected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.1.0, 1.2.1, 1.2.2, 1.2.6