CVE-2019-20478

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-20478
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20478.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-20478
Downstream
Related
Published
2020-02-19T04:15:10Z
Modified
2025-08-09T19:01:27Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

References

Affected packages