Lucene search

K
ibmIBM5000195808A559A70F0746AF9F832AAF0BAA20588373078D5B4E64279A390CF0
HistoryJul 06, 2023 - 1:42 a.m.

Security Bulletin: IBM Match 360 is vulnerable to SnakeYaml's Constructor() class that not restrict types which can be instantiated during deserialization (CVE-2022-1471)

2023-07-0601:42:17
www.ibm.com
6

0.008 Low

EPSS

Percentile

81.7%

Summary

SnakeYamlโ€™s Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYamlโ€™s SafeConsturctor when parsing untrusted content to restrict deserialization.

Vulnerability Details

CVEID:CVE-2022-1471
**DESCRIPTION:**SnakeYaml could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization in the Constructor class. By using a specially-crafted yaml content, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/241118 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
ICP - IBM Match 360 All

Remediation/Fixes

IBM Match 360 is vulnerable to SnakeYamlโ€™s Constructor() class that not restrict types which can be instantiated during deserialization (CVE-2022-1471). Upgrade to Match 360 version 4.7.0 or higher will resolve the vulnerability.

Workarounds and Mitigations

None

CPENameOperatorVersion
ibm cloud pak for dataeq4.