Bug 1461297 (CVE-2017-2810) - CVE-2017-2810 python-tablib: Databook loading functionality allows command execution
Summary: CVE-2017-2810 python-tablib: Databook loading functionality allows command ex...
Alias: CVE-2017-2810
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1461298 1461299 1463481
Blocks: 1461304
TreeView+ depends on / blocked
Reported: 2017-06-14 07:23 UTC by Andrej Nemec
Modified: 2019-09-29 14:14 UTC (History)
23 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
It was found that loading a yaml format Databook from an untrusted source could lead to arbitrary code execution in python-tablib as the safe_load method was not used to load the content.
Clone Of:
Last Closed: 2017-09-12 21:58:01 UTC

Attachments (Terms of Use)

Description Andrej Nemec 2017-06-14 07:23:06 UTC
An exploitable vulnerability exists in the Databook loading functionality of Tablib. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.

External References:


Comment 1 Andrej Nemec 2017-06-14 07:24:10 UTC
Created python-tablib tracking bugs for this issue:

Affects: epel-6 [bug 1461298]
Affects: fedora-all [bug 1461299]

Comment 3 Garth Mollett 2017-06-21 04:56:30 UTC

Red Hat Product Security has rated this issue as having Low security impact in Red Hat OpenStack Platform. While the code is present in the python-tablib package, it is not reachable in any supported configuration. There is currently no plan to address this flaw in any supported version of Red Hat OpenStack platform.

Note You need to log in before you can comment on or make changes to this bug.