Safety vulnerability ID: 41379
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Pytoolbox 14.0.0 includes a security patch for the function 'load_metadata' in 'pytoolbox/juju.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/davidfischer-ch/pytoolbox/commit/748250794514681c0ef8725047a5da4dd9d8a7fd#diff-70bec318e5ce058eed29fb35ad6b97d24ece119b0a51b7f1cdb5a064a4bf5b6b
Latest version: 14.8.4
Toolbox for Python scripts
Pytoolbox version 14.0.0 includes a security patch for the function 'load_metadata' in 'pytoolbox/juju.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/davidfischer-ch/pytoolbox/commit/748250794514681c0ef8725047a5da4dd9d8a7fd#diff-70bec318e5ce058eed29fb35ad6b97d24ece119b0a51b7f1cdb5a064a4bf5b6b
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application