Arbitrary Code Execution Affecting osbs-client package, versions [0.4.6, 0.56.1)
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Threat Intelligence
EPSS
0.1% (41st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PYTHON-OSBSCLIENT-451566
- published 12 Jul 2019
- disclosed 11 Jul 2019
- credit Martin Basti
Introduced: 11 Jul 2019
CVE-2019-10135 Open this link in a new tabHow to fix?
Upgrade osbs-client
to version 0.56.1 or higher.
Overview
osbs-client is a Python module and command line client for OpenShift Build Service.
Affected versions of this package are vulnerable to Arbitrary Code Execution. Insecure use of the yaml.load()
function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.