Lucene search

K
githubGitHub Advisory DatabaseGHSA-JM7R-4PG6-GF26
HistoryAug 25, 2023 - 9:30 p.m.

Esoteric YamlBeans Unsafe Deserialization vulnerability

2023-08-2521:30:47
CWE-502
GitHub Advisory Database
github.com
13
esoteric yamlbeans
unsafe deserialization
untrusted
vulnerability
java classes
yaml document

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

24.3%

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

Affected configurations

Vulners
Node
com.esotericsoftware.yamlbeansyamlbeansRange1.15
VendorProductVersionCPE
com.esotericsoftware.yamlbeansyamlbeans*cpe:2.3:a:com.esotericsoftware.yamlbeans:yamlbeans:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

24.3%

Related for GHSA-JM7R-4PG6-GF26