A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 | Issue Tracking |
https://github.com/containerbuildsystem/osbs-client/pull/865 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 | Issue Tracking |
https://github.com/containerbuildsystem/osbs-client/pull/865 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 - Issue Tracking | |
References | () https://github.com/containerbuildsystem/osbs-client/pull/865 - Patch, Third Party Advisory |
Information
Published : 2019-07-11 19:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10135
Mitre link : CVE-2019-10135
CVE.ORG link : CVE-2019-10135
JSON object : View
Products Affected
osbs-client_project
- osbs-client
CWE
CWE-502
Deserialization of Untrusted Data