Safety vulnerability ID: 41332
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Installtool 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58
Latest version: 1.0
Perform remote installs using yaml runbooks
Installtool version 1.0 includes a security patch for the function 'XEQ' in 'installtool.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/l0r3zz/public/commit/ab00de531d125629c11811473bfee9e4063572b2#diff-4f5fe0b656de6953412f12024a4e76b35b618409e88f79d86e52c52c020dac58
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application