Page 1 of 1

Unsafe YAML load can lead to remote code execution

Posted: Mon Oct 28, 2024 4:00 pm
by Shane1145
Yaml.load() has the ability to construct an arbitrary Python object. This is dangerous if you receive a YAML document from an untrusted source.
The issue arises when a program uses a YAML parser that improperly handles untrusted YAML input, allowing attackers to inject malicious payloads. This can result in the execution of arbitrary code on the server, posing a severe security risk if user inputs are not carefully validated.


https://hackerone.com/reports/2467232