Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1953

Опубликовано: 13 мар. 2020
Источник: redhat
CVSS3: 9
EPSS Низкий

Описание

Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.

A flaw was found in the Apache Commons Configuration, where it uses a third-party library to process YAML files, which by default, allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. If a YAML file was loaded from an untrusted source, it could load and execute code out of the control of the host application.

Отчет

Several packages are unaffected because they do not include support for YAML configurations:

  • apache-commons-configuration as shipped with Red Hat Enterprise Linux 7
  • apache-commons-configuration as shipped with Red Hat Enterprise Virtualization
  • rh-maven35-apache-commons-configuration as shipped with Red Hat Software Collections
  • commons-configuration as shipped with Red Hat Gluster Storage

Меры по смягчению последствий

There is currently no mitigation available for this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2commons-configuration2Not affected
Red Hat A-MQ Onlinecommons-configuration2Not affected
Red Hat BPM Suite 6commons-configurationNot affected
Red Hat Decision Manager 7commons-configurationNot affected
Red Hat Enterprise Linux 7apache-commons-configurationNot affected
Red Hat JBoss BRMS 5commons-configurationOut of support scope
Red Hat JBoss BRMS 6commons-configurationNot affected
Red Hat JBoss Data Grid 7commons-configuration2Not affected
Red Hat JBoss Enterprise Application Platform 6commons-configurationNot affected
Red Hat JBoss Enterprise Application Platform 7commons-configuration2Not affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1815212apache-commons-configuration: uncontrolled class instantiation when loading YAML files

EPSS

Процентиль: 86%
0.02732
Низкий

9 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
ubuntu
почти 6 лет назад

Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.

CVSS3: 10
nvd
почти 6 лет назад

Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application.

CVSS3: 10
debian
почти 6 лет назад

Apache Commons Configuration uses a third-party library to parse YAML ...

CVSS3: 10
github
больше 5 лет назад

Remote code execution in Apache Commons Configuration

CVSS3: 10
fstec
почти 6 лет назад

Уязвимость библиотеки библиотеки Apache Commons Configuration, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.02732
Низкий

9 Critical

CVSS3