CVE-2021-21371

Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerability data, then generate Jira Tasks and sub-tasks based on the vulnerabilities' current state. It published in pypi as "tenable-jira-cloud". In tenable-jira-cloud before version 1.1.21, it is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. This is fixed in version 1.1.21 by using yaml.safe_load() instead of yaml.load().
Configurations

Configuration 1 (hide)

cpe:2.3:a:tenable:jira_cloud:*:*:*:*:*:*:*:*

History

18 Mar 2021, 20:38

Type Values Removed Values Added
References (CONFIRM) https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r - (CONFIRM) https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r - Third Party Advisory
References (MISC) https://pypi.org/project/tenable-jira-cloud/ - (MISC) https://pypi.org/project/tenable-jira-cloud/ - Product, Third Party Advisory
References (MISC) https://pyyaml.docsforge.com/master/documentation/#loading-yaml - (MISC) https://pyyaml.docsforge.com/master/documentation/#loading-yaml - Third Party Advisory
References (MISC) https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0 - (MISC) https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0 - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 8.6
CPE cpe:2.3:a:tenable:jira_cloud:*:*:*:*:*:*:*:*

10 Mar 2021, 22:24

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-10 22:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-21371

Mitre link : CVE-2021-21371

CVE.ORG link : CVE-2021-21371


JSON object : View

Products Affected

tenable

  • jira_cloud
CWE
CWE-502

Deserialization of Untrusted Data