137 lines
4.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2020-10289",
"sourceIdentifier": "cve@aliasrobotics.com",
"published": "2020-08-20T08:15:10.357",
"lastModified": "2021-12-20T22:30:26.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug."
},
{
"lang": "es",
"value": "El uso de una carga de yaml no segura. Permite la creaci\u00f3n de instancias de objetos arbitrarios. El fallo en s\u00ed es causado por un an\u00e1lisis no seguro de los valores YAML que ocurre cada vez que un mensaje de acci\u00f3n es procesado para ser enviado y permite la creaci\u00f3n de objetos de Python. A trav\u00e9s de este fallo en el paquete central ROS de actionlib, un atacante con acceso local o remoto puede hacer que ROS Master, ejecute c\u00f3digo arbitrario en un formulario de Python. Considere en su lugar la funci\u00f3n yaml.safe_load(). Ubicada primero en la biblioteca actionlib/tools/library.py:132. Consulte los enlaces para m\u00e1s informaci\u00f3n sobre el error."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cve@aliasrobotics.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "cve@aliasrobotics.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openrobotics:robot_operating_system:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BFEE12D7-4A38-466E-B8E0-D0FADBC00CE4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ros/actionlib/pull/171",
"source": "cve@aliasrobotics.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}