CVE-2020-14343

CRITICAL

Pyyaml < 5.4 - Improper Input Validation

Title source: rule

Description

A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.

Exploits (3)

nomisec WORKING POC 3 stars
by j4k0m · poc
https://github.com/j4k0m/loader-CVE-2020-14343
nomisec WORKING POC
by sijie52 · poc
https://github.com/sijie52/yasa-cve-2020-14343
nomisec WORKING POC
by Kairo-one · poc
https://github.com/Kairo-one/CVE-2020-14343-PyYAML

Scores

CVSS v3 9.8
EPSS 0.1402
EPSS Percentile 94.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-20
Status published
Products (4)
oracle/communications_cloud_native_core_network_function_cloud_native_environment 1.10.0
oracle/communications_cloud_native_core_network_function_cloud_native_environment 22.1.0
pypi/PyYAML 0 - 5.4PyPI
pyyaml/pyyaml 5.1 - 5.4
Published Feb 09, 2021
Tracked Since Feb 18, 2026