{"id":"CVE-2019-20477","details":"PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.","aliases":["GHSA-3pqx-4fqf-j49f","PYSEC-2020-176"],"modified":"2026-05-15T12:03:52.895064798Z","published":"2020-02-19T04:15:10.803Z","related":["ALSA-2020:4641"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"],"vendor_product":"fedoraproject:fedora","source":"CPE_FIELD","extracted_events":[{"last_affected":"30"},{"last_affected":"31"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/"},{"type":"ADVISORY","url":"https://github.com/yaml/pyyaml/blob/master/CHANGES"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/download/47655"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}