Safety vulnerability ID: 41312
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Ciftify 2.3.3 includes a security patch for the function '__read_settings' in 'ciftify/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/edickie/ciftify/commit/7ac66dc2efc78bae272a0e1e713c81756f780969#diff-d55ace9e33dabdeba89768d93ae8fe97cf6d2ba4936fc5ab472b7bf749270b63
Latest version: 2.3.3
The tools of the Human Connectome Project (HCP) adapted for working with non-HCP datasets
Ciftify version 2.3.3 includes a security patch for the function '__read_settings' in 'ciftify/utils.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/edickie/ciftify/commit/7ac66dc2efc78bae272a0e1e713c81756f780969#diff-d55ace9e33dabdeba89768d93ae8fe97cf6d2ba4936fc5ab472b7bf749270b63
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application