CVE-2022-1471

CVSS V2 None CVSS V3 None
Description
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Overview
  • CVE ID
  • CVE-2022-1471
  • Assigner
  • cve-coordination@google.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2022-12-01T11:15:10
  • Last Modified Date
  • 2023-04-25T17:15:08
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:snakeyaml_project:snakeyaml:1.30:*:*:*:*:*:*:* 1 OR
History
Created Old Value New Value Data Type Notes
2022-12-07 18:05:49 Added to TrackCVE
2022-12-19 12:14:31 2022-12-01T11:15:10.553 2022-12-01T11:15:10 CVE Published Date updated
2022-12-19 12:14:31 2022-12-19T11:15:09 CVE Modified Date updated
2022-12-19 12:14:31 Analyzed Modified Vulnerability Status updated
2022-12-19 12:14:32 References updated
2022-12-21 07:02:19 Modified Undergoing Analysis Vulnerability Status updated
2022-12-21 07:02:20 Weakness Enumeration update
2023-02-11 19:13:46 2023-02-11T17:42:58 CVE Modified Date updated
2023-02-11 19:13:46 Undergoing Analysis Analyzed Vulnerability Status updated
2023-03-21 13:14:23 Analyzed Undergoing Analysis Vulnerability Status updated
2023-03-21 14:14:55 2023-03-21T13:17:25 CVE Modified Date updated
2023-03-21 14:14:55 Undergoing Analysis Analyzed Vulnerability Status updated
2023-04-25 18:03:34 2023-04-25T17:15:08 CVE Modified Date updated
2023-04-25 18:03:34 Analyzed Modified Vulnerability Status updated
2023-04-25 18:03:35 SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond. Description updated
2023-04-25 18:03:35 References updated