cve/2019/CVE-2019-20478.md

19 lines
776 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-20478](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20478)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
### POC
#### Reference
- https://www.exploit-db.com/exploits/47655
2024-06-09 00:33:16 +00:00
- https://www.exploit-db.com/exploits/47655
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.