CVE-2019-10135

A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osbs-client_project:osbs-client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 - Issue Tracking
References () https://github.com/containerbuildsystem/osbs-client/pull/865 - Patch, Third Party Advisory () https://github.com/containerbuildsystem/osbs-client/pull/865 - Patch, Third Party Advisory

Information

Published : 2019-07-11 19:15

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10135

Mitre link : CVE-2019-10135

CVE.ORG link : CVE-2019-10135


JSON object : View

Products Affected

osbs-client_project

  • osbs-client
CWE
CWE-502

Deserialization of Untrusted Data