Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-1471

Опубликовано: 01 дек. 2022
Источник: nvd
CVSS3: 8.3
CVSS3: 9.8
EPSS Критический

Описание

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:snakeyaml_project:snakeyaml:*:*:*:*:*:*:*:*
Версия до 2.0 (исключая)

EPSS

Процентиль: 100%
0.93849
Критический

8.3 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 8.3
ubuntu
около 3 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 9.8
redhat
около 3 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
debian
около 3 лет назад

SnakeYaml's Constructor() class does not restrict types which can be i ...

rocky
почти 3 года назад

Important: prometheus-jmx-exporter security update

CVSS3: 8.3
github
почти 3 года назад

SnakeYaml Constructor Deserialization Remote Code Execution

EPSS

Процентиль: 100%
0.93849
Критический

8.3 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502