OISF suricata-update unsafely deserializes YAML data
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Oct 28, 2024
Description
Published by the National Vulnerability Database
Apr 18, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Feb 23, 2024
Last updated
Oct 28, 2024
Suricata-Update uses the insecure
yaml.load()
function. Code will be executed if the yaml-file contains lines like:The vulnerable function can be triggered by "suricata-update list-sources". The locally stored index.yaml will be loaded in this function and the malicious code gets executed.
References