Home
Help
Search
Login
Register
OPNsense Forum
»
Archive
»
21.1 Legacy Series
»
PyYAML - CVE-2020-14343
« previous
next »
Print
Pages: [
1
]
Author
Topic: PyYAML - CVE-2020-14343 (Read 2168 times)
adk20
Newbie
Posts: 46
Karma: 3
PyYAML - CVE-2020-14343
«
on:
June 05, 2021, 06:49:33 pm »
Just ran a security audit of my OpnSense installation and noticed that there is an (R?)CE vuln in PyYAML with a 9.8 CVSS.
Does it actually affect OpnSense as long as one doesn't open YAML files from untrusted sources? IMHO one would need to be tricked into opening a crafted YAML file.
From what I can see, the automatic downloads like Suricata rules and Unbound blocklists are not in YAML format. I.e. no potentially crafted files should be parsed.
Any feedback is much appreciated.
Logged
fabian
Hero Member
Posts: 2769
Karma: 200
OPNsense Contributor (Language, VPN, Proxy, etc.)
Re: PyYAML - CVE-2020-14343
«
Reply #1 on:
June 05, 2021, 07:21:20 pm »
AFAIK there is not a single yaml file on OPNsense. From my knowledge, OPNsense parses:
* Plaintext
* CSV
* JSON
* XML
So my guess is that it is pulled in by a 3rd party library (no direct dependency of OPnsense) or you have installed it manually.
Logged
franco
Administrator
Hero Member
Posts: 17660
Karma: 1611
Re: PyYAML - CVE-2020-14343
«
Reply #2 on:
June 06, 2021, 10:02:14 am »
# pkg info -r py37-yaml
py37-yaml-5.4.1:
suricata-devel-6.0.2_1
Suricata uses yaml configuration files that OPNsense writes. It is, however, unlikely to be exploited due to "when it processes untrusted YAML files" unless the attacker has root access to your system in which case the point is moot anyway.
Cheers,
Franco
Logged
adk20
Newbie
Posts: 46
Karma: 3
Re: PyYAML - CVE-2020-14343
«
Reply #3 on:
June 06, 2021, 05:09:28 pm »
@franco: Many thanks for your reply. This is what I guessed and hoped for.
Logged
Print
Pages: [
1
]
« previous
next »
OPNsense Forum
»
Archive
»
21.1 Legacy Series
»
PyYAML - CVE-2020-14343