Lucene search

K
cve[email protected]CVE-2023-46302
HistoryNov 20, 2023 - 9:15 a.m.

CVE-2023-46302

2023-11-2009:15:07
CWE-502
web.nvd.nist.gov
46
cve-2023-46302
apache software foundation
apache submarine
yaml bug
serialization
jaxrs
rest endpoints
yamlentityprovider
yamlutils.java
jackson-dataformat-yaml
version 0.8.0
pr 1054

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.8%

Apache Software Foundation Apache Submarine has a bug when serializing against yaml. The bug is caused by snakeyaml https://nvd.nist.gov/vuln/detail/CVE-2022-1471 .

Apache Submarine uses JAXRS to define REST endpoints. In order to
handle YAML requests (using application/yaml content-type), it defines
a YamlEntityProvider entity provider that will process all incoming
YAML requests. In order to unmarshal the request, the readFrom method
is invoked, passing the entityStream containing the user-supplied data in submarine-server/server-core/src/main/java/org/apache/submarine/server/utils/YamlUtils.java.

We have now fixed this issue in the new version by replacing to jackson-dataformat-yaml.
This issue affects Apache Submarine: from 0.7.0 before 0.8.0. Users are recommended to upgrade to version 0.8.0, which fixes this issue.
If using the version smaller than 0.8.0 and not want to upgrade, you can try cherry-pick PR https://github.com/apache/submarine/pull/1054 and rebuild the submart-server image to fix this.

Affected configurations

Vulners
NVD
Node
apachesubmarineRange0.8.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Submarine",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThan": "0.8.0",
        "status": "affected",
        "version": "0.7.0",
        "versionType": "semver"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

81.8%