CVE-2024-39780

A YAML deserialization vulnerability was found in the Robot Operating System (ROS) 'dynparam', a command-line tool for getting, setting, and deleting parameters of a dynamically configurable node, affecting ROS distributions Noetic and earlier. The issue is caused by the use of the yaml.load() function in the 'set' and 'get' verbs, and allows for the creation of arbitrary Python objects. Through this flaw, a local or remote user can craft and execute arbitrary Python code.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openrobotics:robot_operating_system:indigo_igloo:*:*:*:*:*:*:*
cpe:2.3:o:openrobotics:robot_operating_system:kinetic_kame:*:*:*:*:*:*:*
cpe:2.3:o:openrobotics:robot_operating_system:melodic_morenia:*:*:*:*:*:*:*
cpe:2.3:o:openrobotics:robot_operating_system:noetic_ninjemys:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-02 08:15

Updated : 2025-08-26 16:36


NVD link : CVE-2024-39780

Mitre link : CVE-2024-39780

CVE.ORG link : CVE-2024-39780


JSON object : View

Products Affected

openrobotics

  • robot_operating_system
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data