Lucene search

K
nvd[email protected]NVD:CVE-2023-24620
HistoryAug 25, 2023 - 8:15 p.m.

CVE-2023-24620

2023-08-2520:15:07
CWE-611
web.nvd.nist.gov
cve-2023-24620
yaml document
xml entity expansion
yamlbeans yamlreader
anchor feature
cpu consumption
memory consumption
out-of-memory exception

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

19.0%

An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.

Affected configurations

Nvd
Node
esotericsoftwareyamlbeansRange1.15
VendorProductVersionCPE
esotericsoftwareyamlbeans*cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

19.0%

Related for NVD:CVE-2023-24620