Safety vulnerability ID: 41314
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Database-Sanitizer 1.1.0 includes a security patch for the function 'from_file' in 'database_sanitizer/config.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/andersinno/python-database-sanitizer/commit/ace4e0823d7b81c6f3bf683eb97193b36cc6c040#diff-6090be0559642595d2ff5ff2e9d265c6d152a75ef98845380436d0f06e0b3c19
Latest version: 1.1.0
Sanitizes contents of a database.
Database-Sanitizer version 1.1.0 includes a security patch for the function 'from_file' in 'database_sanitizer/config.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/andersinno/python-database-sanitizer/commit/ace4e0823d7b81c6f3bf683eb97193b36cc6c040#diff-6090be0559642595d2ff5ff2e9d265c6d152a75ef98845380436d0f06e0b3c19
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application