CVE-2017-16615:
Unsafe deserialization in MLAlchemy
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
-
Published
7/13/2018
Updated
9/24/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
MLAlchemy | pip | < 0.2.2 | 0.2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly tied to the parse_yaml_query function in parser.py where unsafe yaml.load() was used. The GitHub commit diff shows this was the only function modified to fix the issue (replaced with yaml.safe_load()). Multiple sources including CVE description, GHSA advisory, and the patch commit confirm this function's unsafe deserialization was the root cause. The added security test further validates this was the attack vector by testing YAML payload rejection after the fix.