Description
A high-severity remote code execution vulnerability exists in feast-dev/feast version 0.53.0, specifically in the Kubernetes materializer job located at `feast/sdk/python/feast/infra/compute_engines/kubernetes/main.py`. The vulnerability arises from the use of `yaml.load(..., Loader=yaml.Loader)` to deserialize `/var/feast/feature_store.yaml` and `/var/feast/materialization_config.yaml`. This method allows for the instantiation of arbitrary Python objects, enabling an attacker with the ability to modify these YAML files to execute OS commands on the worker pod. This vulnerability can be exploited before the configuration is validated, potentially leading to cluster takeover, data poisoning, and supply-chain sabotage.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
References
huntr.com/bounties/46d4d585-b968-4a76-80ce-872bc5525564
github.com/...ommit/b2e37ff37953b68ae833f6874ab5bc510a4ca5fb
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.