Improper Input Validation Affecting ros-actionlib package, versions <1.13.1-4


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.11% (47th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-ROSACTIONLIB-608242
  • published22 Aug 2020
  • disclosed20 Aug 2020

Introduced: 20 Aug 2020

CVE-2020-10289  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:11 ros-actionlib to version 1.13.1-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ros-actionlib package and not the ros-actionlib package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

Use of unsafe yaml load. Allows instantiation of arbitrary objects. The flaw itself is caused by an unsafe parsing of YAML values which happens whenever an action message is processed to be sent, and allows for the creation of Python objects. Through this flaw in the ROS core package of actionlib, an attacker with local or remote access can make the ROS Master, execute arbitrary code in Python form. Consider yaml.safe_load() instead. Located first in actionlib/tools/library.py:132. See links for more info on the bug.

CVSS Scores

version 3.1