An issue in the YAML Python library of NASA AIT-Core v2.5.2 allows attackers to execute arbitrary commands via supplying a crafted YAML file.
References
| Link | Resource |
|---|---|
| https://github.com/advisories/GHSA-45q4-h8rr-hgx2 | Third Party Advisory |
| https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze | Exploit |
| https://github.com/advisories/GHSA-45q4-h8rr-hgx2 | Third Party Advisory |
| https://www.linkedin.com/pulse/remote-code-execution-via-man-in-the-middle-more-ujkze | Exploit |
Configurations
History
No history.
Information
Published : 2024-05-21 19:15
Updated : 2025-06-03 14:16
NVD link : CVE-2024-35060
Mitre link : CVE-2024-35060
CVE.ORG link : CVE-2024-35060
JSON object : View
Products Affected
nasa
- ait_core
CWE
CWE-319
Cleartext Transmission of Sensitive Information
