Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-1471

Опубликовано: 01 дек. 2022
Источник: nvd
CVSS3: 8.3
CVSS3: 9.8
EPSS Критический

Описание

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:snakeyaml_project:snakeyaml:*:*:*:*:*:*:*:*
Версия до 2.0 (исключая)

EPSS

Процентиль: 100%
0.93796
Критический

8.3 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 9.8
redhat
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
debian
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be i ...

rocky
больше 2 лет назад

Important: prometheus-jmx-exporter security update

CVSS3: 8.3
github
больше 2 лет назад

SnakeYaml Constructor Deserialization Remote Code Execution

EPSS

Процентиль: 100%
0.93796
Критический

8.3 High

CVSS3

9.8 Critical

CVSS3

Дефекты

CWE-20
CWE-502