You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@commons.apache.org by "Aaron Coady (Jira)" <ji...@apache.org> on 2023/03/24 15:14:00 UTC

[jira] [Created] (CONFIGURATION-829) Critical security vulnerability in snakeyaml

Aaron Coady created CONFIGURATION-829:
-----------------------------------------

             Summary: Critical security vulnerability in snakeyaml
                 Key: CONFIGURATION-829
                 URL: https://issues.apache.org/jira/browse/CONFIGURATION-829
             Project: Commons Configuration
          Issue Type: Bug
          Components: File reloading
    Affects Versions: 2.8.0
            Reporter: Aaron Coady


This vulnerability is fixed in snakeyaml 2.0 and requires a backwards incompatible change in the constructor
[https://nvd.nist.gov/vuln/detail/CVE-2022-1471]

 

SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)