A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
References
Link | Resource |
---|---|
https://github.com/containerbuildsystem/osbs-client/pull/865 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 | Issue Tracking |
Configurations
Information
Published : 2019-07-11 12:15
Updated : 2022-11-07 11:17
NVD link : CVE-2019-10135
Mitre link : CVE-2019-10135
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
osbs-client_project
- osbs-client