Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-1471

Опубликовано: 13 окт. 2022
Источник: redhat
CVSS3: 9.8
EPSS Критический

Описание

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).

Отчет

In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml's SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker's control. Due to that the impact for RHPAM is reduced to Low. Red Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml's Constructor class nor pass untrusted data to this class. When this class is used, it’s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
A-MQ Clients 2snakeyamlAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel8Not affected
Red Hat AMQ Broker 7snakeyamlNot affected
Red Hat A-MQ OnlinesnakeyamlNot affected
Red Hat build of Apache Camel for Spring Boot 3snakeyamlAffected
Red Hat build of Apicurio Registry 2snakeyamlNot affected
Red Hat build of Debezium 1snakeyamlNot affected
Red Hat build of OpenJDK 11snakeyamlNot affected
Red Hat Data Grid 8snakeyamlWill not fix
Red Hat Decision Manager 7snakeyamlAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20->CWE-1066->CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=2150009SnakeYaml: Constructor Deserialization Remote Code Execution

EPSS

Процентиль: 100%
0.93796
Критический

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.3
ubuntu
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
nvd
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.

CVSS3: 8.3
debian
больше 2 лет назад

SnakeYaml's Constructor() class does not restrict types which can be i ...

rocky
больше 2 лет назад

Important: prometheus-jmx-exporter security update

CVSS3: 8.3
github
больше 2 лет назад

SnakeYaml Constructor Deserialization Remote Code Execution

EPSS

Процентиль: 100%
0.93796
Критический

9.8 Critical

CVSS3