Last Modified: Dec. 6, 2022
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
Tweets last week: 1
Remaining steady
Yahoo results: 322000000
Strongly raising
Current EPSS Score: 0.05634
Remaining steady
Reddit Posts: 3
Remaining steady
Github Repos: 1
Remaining steady
Found exploits:
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Base Score: 9.8
Exploitability Score:
3.9
Impact Score: 5.9
CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-502
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:* Part: a Vendor: snakeyaml_project | Alle Schwachstellen für snakeyaml_project |
CWE-ID:
Not defined
Base Score V3:
Not defined
Exploitability Score V3:
Not defined
Impact Score V3:
Not defined
Cvss Vector V3:
Not defined
Configuration:
added:
cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*
Reference:
added:
https://github.com/mbechler/marshalsec
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true
https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*"/> </set> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> </set>