Vulnerability Details CVE-2019-10135
A flaw was found in the yaml.load() function in the osbs-client versions since 0.46 before 0.56.1. Insecure use of the yaml.load() function allowed the user to load any suspicious object for code execution via the parsing of malicious YAML files.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 72.5%
CVSS Severity
CVSS v3 Score 7.2
CVSS v2 Score 6.5
Products affected by CVE-2019-10135
-
cpe:2.3:a:osbs-client_project:osbs-client:0.46
-
cpe:2.3:a:osbs-client_project:osbs-client:0.46.1
-
cpe:2.3:a:osbs-client_project:osbs-client:0.47
-
cpe:2.3:a:osbs-client_project:osbs-client:0.48
-
cpe:2.3:a:osbs-client_project:osbs-client:0.49
-
cpe:2.3:a:osbs-client_project:osbs-client:0.50
-
cpe:2.3:a:osbs-client_project:osbs-client:0.51
-
cpe:2.3:a:osbs-client_project:osbs-client:0.51.1
-
cpe:2.3:a:osbs-client_project:osbs-client:0.52
-
cpe:2.3:a:osbs-client_project:osbs-client:0.53
-
cpe:2.3:a:osbs-client_project:osbs-client:0.53.1
-
cpe:2.3:a:osbs-client_project:osbs-client:0.54
-
cpe:2.3:a:osbs-client_project:osbs-client:0.54.1
-
cpe:2.3:a:osbs-client_project:osbs-client:0.55
-
cpe:2.3:a:osbs-client_project:osbs-client:0.56