Fix Arbitary Code Execution in MixMatch-Pytorch#1
Fix Arbitary Code Execution in MixMatch-Pytorch#1b1nslashsh wants to merge 1 commit into418sec:masterfrom
Conversation
|
👋 Hello, @Gooongna - @b1nslashsh has opened a PR to us with a fix for a potential vulnerability in your repository. To view the vulnerability, please refer to the bounty URL in the first comment, above. Ultimately, you get to decide if the fix is 👍 or 👎. If you are happy with the fix, please write a new comment ( If you have any questions or need support, come and join us on our community Discord! @Gooongna & @b1nslashsh - thank you for your efforts in securing the world’s open source code! 🎉 🔨 Want more security researchers protecting your repository? Stick our badge on your Copy this small code snippet and insert it into your
👇 👇 👇 |
|
hey @Gooongna any updates on this? |
📊 Metadata *
Access-Control package is vulnerable to Arbitary Code Execution due to insecure yaml desearilization.
Bounty URL:
https://www.huntr.dev/bounties/1-other-MixMatch-Pytorch-Implementation/
⚙️ Description *
Vulnerable to YAML deserialization attack caused by unsafe loading.
💻 Technical Description *
Fixed by avoiding unsafe loader.
🐛 Proof of Concept (PoC) *
🔥 Proof of Fix (PoF) *
fixed Arbitary Code Execution in MixMatch-Pytorch by adding SafeLoader
👍 User Acceptance Testing (UAT)
everything working fine after fix 👍🏻
🔗 Relates to...
https://www.huntr.dev/bounties/1-other-MixMatch-Pytorch-Implementation/