{"id":"CVE-2019-20477","details":"PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.","aliases":["GHSA-3pqx-4fqf-j49f","PYSEC-2020-176"],"modified":"2026-03-14T01:43:43.854131Z","published":"2020-02-19T04:15:10.803Z","related":["ALSA-2020:4641"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/"},{"type":"ADVISORY","url":"https://github.com/yaml/pyyaml/blob/master/CHANGES"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/download/47655"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yaml/pyyaml","events":[{"introduced":"e471e86bf6dabdad45a1438c20a4a5c033eb9034"},{"last_affected":"a9b98a3daa43d43afd8051b014d5b4154d141913"}],"database_specific":{"versions":[{"introduced":"5.1"},{"last_affected":"5.1.2"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20477.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}