CVE-2024-42363

Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.
Configurations

No configuration.

History

No history.

Information

Published : 2024-08-20 21:15

Updated : 2024-08-21 12:30


NVD link : CVE-2024-42363

Mitre link : CVE-2024-42363

CVE.ORG link : CVE-2024-42363


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data