Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20478

Опубликовано: 19 фев. 2020
Источник: debian
EPSS Низкий

Описание

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruamel.yamlunfixedpackage

Примечания

  • This is a well-known design deficiency in pyyaml (of which ruamel.yaml is derived),

  • various CVE IDs have been assigned to applications misusing the API over the years.

  • pyyaml 5.1 changed the default hebaviour

EPSS

Процентиль: 91%
0.07299
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

CVSS3: 9.8
redhat
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

CVSS3: 9.8
nvd
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

github
больше 3 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

EPSS

Процентиль: 91%
0.07299
Низкий