The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code, related to the openapi.py yaml.load function argument.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
https://github.com/embedchain/embedchain/pull/1122 | patch issue tracking |
https://github.com/embedchain/embedchain/compare/0.1.56...0.1.57 | patch |