ID: CVE-2022-1471

Last Modified: Dec. 6, 2022

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.

Twitter Activity

Tweets last week: 1

Remaining steady

Yahoo Activity

Yahoo results: 322000000

Strongly raising

EPSS History

Current EPSS Score: 0.05634

Remaining steady


Reddit Activity

Reddit Posts: 3

Remaining steady

Github Repos

Github Repos: 1

Remaining steady

Exploits

Found exploits:

Attack Vector: Network

Attack Complexity: Low

Privileges Required: None

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 9.8

Exploitability Score: 3.9

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Specialize CVSS-Score

CWE-502

Condition Configuration
OR
OR
Alle Schwachstellen für snakeyaml_project
Date: Dec. 6, 2022

CWE-ID: Not defined
Base Score V3: Not defined
Exploitability Score V3: Not defined
Impact Score V3: Not defined
Cvss Vector V3: Not defined
Configuration:
added:
cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*



Date: Dec. 19, 2022

Reference:
added:
https://github.com/mbechler/marshalsec
https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true
https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="application" value="cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>