CVE-2019-20478

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-20478
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20478.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-20478
Related
Published
2020-02-19T04:15:10Z
Modified
2025-01-14T07:54:35.688954Z
Downstream
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

References

Affected packages

Debian:11 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.16.12-2
0.17.16-1
0.17.21-1~exp1
0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}