Vulnerabilities disclosed in SnakeYAML library
Issue date: 14-12-2022Affects versions: 15.1, 14.7, 13.4
Security Issue ID
SECURITY-370
SECURITY-371
SECURITY-372
SECURITY-373
SECURITY-374
Affected Product Version(s)
15.1.4, 14.7.13, 13.4.21 and previous releases.
Severity
High/Medium
Description
CVE-2022-25857 suppress
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
CVSSv3:
- Base Score: HIGH (7.5)
- Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-38752 (OSSINDEX) suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
CWE-121 Stack-based Buffer Overflow
CVSSv2:
- Base Score: MEDIUM (6.5)
- Vector: /AV:N/AC:L/Au:/C:N/I:N/A:H
CVE-2022-38751 (OSSINDEX) suppress
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
CWE-787 Out-of-bounds Write
CVSSv2:
- Base Score: MEDIUM (6.5)
- Vector: /AV:N/AC:L/Au:/C:N/I:N/A:H
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
Instructions
Customers are recommended to upgrade to the latest version. As of the time of writing, 15.2.0, 14.7.13 or 13.4.22.