A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10135 | Issue Tracking |
https://github.com/containerbuildsystem/osbs-client/pull/865 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2019-07-11T00:00:00
Updated: 2022-10-07T00:00:00
Reserved: 2019-03-27T00:00:00
Link: CVE-2019-10135
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-11T19:15:12.563
Modified: 2022-11-07T19:17:20.370
Link: CVE-2019-10135
JSON object: View
Redhat Information
No data.
CWE