Описание
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
A vulnerability was discovered in the ruamel.yaml library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the load() method. Applications that use ruamel.yaml to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/apply constructor.
Отчет
While the openshift-logging-curator5-container contains the vulnerable code, and method call, it only uses it to load a configuration file, which can be considered trusted data. Therefore this component of OpenShift Container Platform is not affected. The python-openshift the dependency of OpenShift Container Platform is only used in a deprecated and unused build script (that is removed in later versions), and does not pose a risk to consumers of this library. Therefore it will not be fixed.
Меры по смягчению последствий
Use the 'safe_load' method in place of 'load' if loading untrusted data. Alternatively use: yaml=YAML(typ='safe') yaml.load() Reference: https://yaml.readthedocs.io/en/latest/basicuse.html
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat OpenShift Container Platform 3.11 | openshift3/ose-logging-curator5 | Not affected | ||
| Red Hat OpenShift Container Platform 3.11 | python-openshift | Will not fix | ||
| Red Hat OpenShift Container Platform 4 | openshift4/ose-logging-curator5 | Not affected | ||
| Red Hat OpenShift Container Platform 4 | python-openshift | Will not fix | ||
| Red Hat OpenStack Platform 15 (Stein) | python-ruamel-yaml | Out of support scope | ||
| Red Hat OpenStack Platform 16 (Train) | python-ruamel-yaml | Will not fix | ||
| Red Hat Storage 3 | python-ruamel-yaml | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
In ruamel.yaml through 0.16.7, the load method allows remote code exec ...
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
EPSS
9.8 Critical
CVSS3