Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. This issue affects ParlAI prior to v1.1.0.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/facebookresearch/ParlAI/releases/tag/v1.1.0 | third party advisory release notes |
https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg | third party advisory patch |
http://packetstormsecurity.com/files/164136/Facebook-ParlAI-1.0.0-Code-Execution-Deserialization.html | exploit vdb entry third party advisory |