First published: Fri Nov 04 2022(Updated: )
Spring Tools 4 for Eclipse version 4.16.0 and below as well as VSCode extensions such as Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor and Cloudfoundry Manifest YML Support version 1.39.0 and below all use Snakeyaml library for YAML editing support. This library allows for some special syntax in the YAML that under certain circumstances allows for potentially harmful remote code execution by the attacker.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Bosh Editor | >=1.0.0<1.40.0 | |
Vmware Cloudfoundry Manifest Yml Support | >=1.0.0<1.40.0 | |
Vmware Concourse Ci Pipeline Editor | >=1.0.0<1.40.0 | |
Vmware Spring Boot Tools | >=1.0.0<1.40.0 | |
Vmware Spring Tools | >=4.0.0<4.16.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-31691 is classified as medium due to the potential for remote code execution in affected versions.
To fix CVE-2022-31691, update Spring Tools for Eclipse to version 4.16.1 or above, and upgrade all affected VSCode extensions to version 1.40.0 or higher.
CVE-2022-31691 affects Spring Tools 4 for Eclipse version 4.16.0 and below, along with several VSCode extensions from VMware including Spring Boot Tools and Cloudfoundry Manifest YML Support.
The components using the vulnerable Snakeyaml library are Spring Tools for Eclipse, Spring Boot Tools, Concourse CI Pipeline Editor, Bosh Editor, and Cloudfoundry Manifest YML Support.
Yes, CVE-2022-31691 has known exploits that leverage vulnerabilities in the Snakeyaml library for executing arbitrary code.