Vulnerabilities disclosed in SnakeYAML library 

Issue date: 14-12-2022
Affects versions: 15.1, 14.7, 13.4

Security Issue ID

SECURITY-370
SECURITY-371
SECURITY-372
SECURITY-373
SECURITY-374

 

Affected Product Version(s)

15.1.4, 14.7.13, 13.4.21 and previous releases.


Severity 

High/Medium


Description

CVE-2022-25857  suppress

The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.

CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

CVSSv3:

  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
     

CVE-2022-38752 (OSSINDEX)  suppress

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.

CWE-121 Stack-based Buffer Overflow

CVSSv2:

  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/Au:/C:N/I:N/A:H

 

CVE-2022-38751 (OSSINDEX)  suppress

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

CWE-787 Out-of-bounds Write

CVSSv2:

  • Base Score: MEDIUM (6.5)
  • Vector: /AV:N/AC:L/Au:/C:N/I:N/A:H

 

CVE-2022-38750

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

 

CVE-2022-38749

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

Instructions

Customers are recommended to upgrade to the latest version. As of the time of writing, 15.2.0, 14.7.13 or 13.4.22.