VYPR
Critical severity9.8NVD Advisory· Published Nov 10, 2017· Updated May 13, 2026

CVE-2017-16764

CVE-2017-16764

Description

An exploitable vulnerability exists in the YAML parsing functionality in the read_yaml_file method in io_utils.py in django_make_app 0.1.3. A YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
django_make_appPyPI
<= 0.1.3

Affected products

1

Patches

1
acd814433d10

fix: use `YAML.safe_load`, Fixes #5

https://github.com/illagrenan/django-make-appVašek DohnalJan 6, 2018via ghsa
1 file changed · +1 1
  • django_make_app/io_utils.py+1 1 modified
    @@ -12,7 +12,7 @@
     
     def read_yaml_file(filename):
         with io.open(filename, mode='r', encoding='utf-8') as the_file:
    -        return yaml.load(the_file)
    +        return yaml.safe_load(the_file)
     
     
     def optimize_code(filename):
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.