143 lines
4.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2022-1471",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-12-01T11:15:10.553",
"lastModified": "2023-10-13T16:15:10.747",
"vulnStatus": "Modified",
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization.\u00a0Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.\n"
2023-04-24 12:24:31 +02:00
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snakeyaml_project:snakeyaml:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0",
"matchCriteriaId": "3598DC3A-DDD1-4A0B-ACDA-406B85A1EA1A"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/175095/PyTorch-Model-Server-Registration-Deserialization-Remote-Code-Execution.html",
"source": "cve-coordination@google.com"
},
2023-04-24 12:24:31 +02:00
{
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64581479",
"source": "cve-coordination@google.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/mbechler/marshalsec",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://groups.google.com/g/kubernetes-security-announce/c/mwrakFaEdnc",
"source": "cve-coordination@google.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230818-0015/",
"source": "cve-coordination@google.com"
},
2023-04-24 12:24:31 +02:00
{
"url": "https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}