CVE-2017-16618:
Unsafe deserialization in owlmixin
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
7/13/2018
Updated
10/7/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
owlmixin | pip | < 2.0.0 | 2.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems directly from using PyYAML's unsafe yaml.load() method in both load_yaml() and load_yamlf() functions. The commit diff shows these functions were explicitly patched by replacing yaml.load with yaml.safe_load. The CWE-502 mapping and GitHub issue #12 confirm these functions accepted untrusted YAML input without proper sanitization, allowing !!python/object/apply payloads. Test cases added in the commit verify exploitation attempts through these functions.