Description

Prior to 3385, the user-controlled role parameter enters the application in the Kubernetes::RoleVerificationsController. The role parameter flows into the RoleConfigFile initializer and then into the Kubernetes::Util.parse_file method where it is unsafely deserialized using the YAML.load_stream method. This issue may lead to Remote Code Execution (RCE). This vulnerability is fixed in 3385.

INFO

Published Date :

2024-08-20T20:20:03.000Z

Last Modified :

2024-08-20T20:53:00.400Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-42363 vulnerability.

Vendors Products
Zendesk
  • Samson

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact