2024-12-08 03:06:42 +00:00

118 lines
3.5 KiB
JSON

{
"id": "CVE-2023-24620",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-25T20:15:07.893",
"lastModified": "2024-11-21T07:48:14.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception."
},
{
"lang": "es",
"value": "Un problema fue descubierto en Esoteric YamlBeans a trav\u00e9s de 1.15. Un documento YAML manipulado es capaz de realizar un ataque de Expansi\u00f3n de Entidad XML contra YamlReader YamlBeans. Mediante la explotaci\u00f3n de la funci\u00f3n de anclaje en YAML, es posible generar un peque\u00f1o documento YAML que, cuando se lee, se expande a un gran tama\u00f1o, causando el consumo de CPU y memoria, como una excepci\u00f3n Java Out-of-Memory.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.15",
"matchCriteriaId": "AA60B6AE-695A-4791-88C5-576BDEEA4FE4"
}
]
}
]
}
],
"references": [
{
"url": "https://contrastsecurity.com",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/EsotericSoftware",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://contrastsecurity.com",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/EsotericSoftware",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}