Safety vulnerability ID: 43004
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Launchdarkly-server-sdk 6.11.2 uses 'yaml.safe_load()' instead of 'yaml.load()' for YAML/JSON test data parsing to fix an arbitrary code execution vulnerability.
https://github.com/launchdarkly/python-server-sdk/issues/136
Latest version: 9.8.0
LaunchDarkly SDK for Python
Fixed:
- Changed `Files.new_data_source()` to use `yaml.safe_load()` instead of `yaml.load()` for YAML/JSON test data parsing. This disables `pyyaml` extended syntax features that could allow arbitrary code execution. ([136](https://github.com/launchdarkly/python-server-sdk/issues/136))
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application