EPSS
Percentile
90.7%
JYaml is vulnerable to remote code execution. The library allows unsafe deserialization via the load() function, allowing an attacker to execute arbitrary code on the system using a malicious .yml file.
load()
.yml
gist.github.com/j0lt-github/f5141abcacae63d434ecae211422153a
github.com/mbechler/marshalsec
github.com/mbechler/marshalsec/blob/master/marshalsec.pdf
security.netapp.com/advisory/ntap-20200313-0001/
sourceforge.net/p/jyaml/bugs/