CVE-2021-21371

Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
Configurations

Configuration 1 (hide)

cpe:2.3:a:tenable:jira_cloud:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
References () https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0 - Patch, Third Party Advisory () https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0 - Patch, Third Party Advisory
References () https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r - Third Party Advisory () https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r - Third Party Advisory
References () https://pypi.org/project/tenable-jira-cloud/ - Product, Third Party Advisory () https://pypi.org/project/tenable-jira-cloud/ - Product, Third Party Advisory
References () https://pyyaml.docsforge.com/master/documentation/#loading-yaml - Third Party Advisory () https://pyyaml.docsforge.com/master/documentation/#loading-yaml - Third Party Advisory
CVSS v2 : 4.6
v3 : 8.6
v2 : 4.6
v3 : 5.0

Information

Published : 2021-03-10 22:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21371

Mitre link : CVE-2021-21371

CVE.ORG link : CVE-2021-21371


JSON object : View

Products Affected

tenable

  • jira_cloud
CWE
CWE-502

Deserialization of Untrusted Data