Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43811— Code injection via unsafe YAML loading

CVSS 7.8 · High EPSS 8.72% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-43811

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Code injection via unsafe YAML loading
Source: NVD (National Vulnerability Database)
Vulnerability Description
Sockeye is an open-source sequence-to-sequence framework for Neural Machine Translation built on PyTorch. Sockeye uses YAML to store model and data configurations on disk. Versions below 2.3.24 use unsafe YAML loading, which can be made to execute arbitrary code embedded in config files. An attacker can add malicious code to the config file of a trained model and attempt to convince users to download and run it. If users run the model, the embedded code will run locally. The issue is fixed in version 2.3.24.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Sockeye 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Sockeye是一个基于 PyTorch 的用于神经机器翻译的开源序列到序列框架。 Sockeye 存在代码注入漏洞,该漏洞源于Sockeye使用YAML在磁盘上存储模型和数据配置,Sockeye2.3.24以下的版本使用不安全的YAML加载,它可以执行嵌入在配置文件中的任意代码。攻击者可利用该漏洞可以将恶意代码添加到经过训练的模型的配置文件中,并试图说服用户下载并运行它。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
awslabssockeye < 2.3.24 -

II. Public POCs for CVE-2021-43811

#POC DescriptionSource LinkShenlong Link
1awslabs/sockeye Code injection via unsafe YAML loading CVE-2021-43811https://github.com/s-index/CVE-2021-43811POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-43811

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-43811

No comments yet


Leave a comment