First published: Tue Aug 30 2022(Updated: )
Java package org.yaml:snakeyam is vulnerable to a denial of service, caused by missing to nested depth limitation for collections. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Snakeyaml Project Snakeyaml | <1.31 | |
Debian Debian Linux | =10.0 | |
redhat/org.yaml.snakeyaml | <1.31 | 1.31 |
IBM Cloud Transformation Advisor | <=2.0.1 - 3.3.1 | |
maven/org.yaml:snakeyaml | <1.31 | 1.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-25857.
CVE-2022-25857 has a severity level of high.
The affected software packages are org.yaml:snakeyaml (versions up to 1.31), Debian Debian Linux 10.0, and IBM Disconnected Log Collector (versions up to v1.8.2).
CVE-2022-25857 allows a remote attacker to cause a denial of service (DoS) by sending a specially-crafted request.
To fix CVE-2022-25857, upgrade the affected software to a version that is not vulnerable, such as org.yaml:snakeyaml version 1.31 or higher.