First published: Wed Mar 11 2020(Updated: )
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache ShardingSphere | =4.0.0 | |
Apache ShardingSphere | =4.0.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1947 is a vulnerability in Apache ShardingSphere (incubator) 4.0.0-RC3 and 4.0.0 that allows unmarshalling of untrusted data, leading to security flaws.
CVE-2020-1947 has a severity score of 9.8, making it critical.
Apache ShardingSphere 4.0.0-RC3 and 4.0.0 are affected by CVE-2020-1947.
To fix CVE-2020-1947, users should update to a version of Apache ShardingSphere that is not affected by the vulnerability.
More information about CVE-2020-1947 can be found at the following link: [Apache ShardingSphere Advisory](https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E)