Bug 1631411 (CVE-2018-17175)

Summary: CVE-2018-17175 python-marshmallow: Information leak due to invalid usage of the schema "only" option
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, dbaker, igor.raits, jokerman, msuchy, praiskup, sthangav, trankin
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: python-marshmallow 2.15.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-25 22:18:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1631412, 1631413    
Bug Blocks: 1631414    

Description Andrej Nemec 2018-09-20 14:17:29 UTC
In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "only" option treats an empty list as implying no "only" option, which allows a request that was intended to expose no fields to instead expose all fields (if the schema is being filtered dynamically using the "only" option, and there is a user role that produces an empty value for "only").

Upstream issue:


Upstream patches:



Comment 1 Andrej Nemec 2018-09-20 14:19:20 UTC
Created python-marshmallow tracking bugs for this issue:

Affects: epel-all [bug 1631413]
Affects: fedora-all [bug 1631412]