cve/2023/CVE-2023-24621.md

18 lines
725 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-24621](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24621)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
### POC
#### Reference
- https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds