Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-20478

Опубликовано: 19 фев. 2020
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

A vulnerability was discovered in the ruamel.yaml library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the load() method. Applications that use ruamel.yaml to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/apply constructor.

Отчет

While the openshift-logging-curator5-container contains the vulnerable code, and method call, it only uses it to load a configuration file, which can be considered trusted data. Therefore this component of OpenShift Container Platform is not affected. The python-openshift the dependency of OpenShift Container Platform is only used in a deprecated and unused build script (that is removed in later versions), and does not pose a risk to consumers of this library. Therefore it will not be fixed.

Меры по смягчению последствий

Use the 'safe_load' method in place of 'load' if loading untrusted data. Alternatively use: yaml=YAML(typ='safe') yaml.load() Reference: https://yaml.readthedocs.io/en/latest/basicuse.html

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11openshift3/ose-logging-curator5Not affected
Red Hat OpenShift Container Platform 3.11python-openshiftWill not fix
Red Hat OpenShift Container Platform 4openshift4/ose-logging-curator5Not affected
Red Hat OpenShift Container Platform 4python-openshiftWill not fix
Red Hat OpenStack Platform 15 (Stein)python-ruamel-yamlOut of support scope
Red Hat OpenStack Platform 16 (Train)python-ruamel-yamlWill not fix
Red Hat Storage 3python-ruamel-yamlNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1808088python-ruamel-yaml: code execution through load() method with an untrusted argument

EPSS

Процентиль: 91%
0.07299
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

CVSS3: 9.8
nvd
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

CVSS3: 9.8
debian
почти 6 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code exec ...

github
больше 3 лет назад

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

EPSS

Процентиль: 91%
0.07299
Низкий

9.8 Critical

CVSS3