CVE-2021-24040

Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:facebook:parlai:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0 - Release Notes, Third Party Advisory () https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0 - Release Notes, Third Party Advisory
References () https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg - Patch, Third Party Advisory () https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg - Patch, Third Party Advisory

Information

Published : 2021-09-10 22:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24040

Mitre link : CVE-2021-24040

CVE.ORG link : CVE-2021-24040


JSON object : View

Products Affected

facebook

  • parlai
CWE
CWE-502

Deserialization of Untrusted Data