CVE-2019-20478

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2019-20478
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-20478.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-20478
Published
2020-02-19T04:15:10Z
Modified
2024-06-30T13:02:45.309276Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.

References

Affected packages

Debian:11 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.16.12-2
0.17.16-1
0.17.21-1~exp1
0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / ruamel.yaml

Package

Name
ruamel.yaml
Purl
pkg:deb/debian/ruamel.yaml?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.17.21-1
0.18.5-1~exp1
0.18.6-1
0.18.6-2
0.18.6+ds-1
0.18.6+ds-2
0.18.6+ds-3

Ecosystem specific

{
    "urgency": "unimportant"
}