CVE-2019-10135

A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osbs-client_project:osbs-client:*:*:*:*:*:*:*:*

History

02 Nov 2021, 19:32

Type Values Removed Values Added
CWE CWE-20 CWE-502

Information

Published : 2019-07-11 19:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-10135

Mitre link : CVE-2019-10135

CVE.ORG link : CVE-2019-10135


JSON object : View

Products Affected

osbs-client_project

  • osbs-client
CWE
CWE-502

Deserialization of Untrusted Data