Safety vulnerability ID: 41313
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Cloudwatch-To-Graphite 0.11.0 includes a security patch for the function 'get_config' in 'leadbutt.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/crccheck/cloudwatch-to-graphite/commit/5875100c54a54a9c90cf2fe782cc3df147d32053#diff-ddb0922eafb2fa54199e50bb13de6178b1755e780387144df032f9e26512f15e
Latest version: 0.11.0
Helper for pushing AWS CloudWatch metrics to Graphite
Cloudwatch-To-Graphite version 0.11.0 includes a security patch for the function 'get_config' in 'leadbutt.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/crccheck/cloudwatch-to-graphite/commit/5875100c54a54a9c90cf2fe782cc3df147d32053#diff-ddb0922eafb2fa54199e50bb13de6178b1755e780387144df032f9e26512f15e
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application