First published: Thu Dec 01 2022(Updated: )
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
Affected Software | Affected Version | How to fix |
---|---|---|
SnakeYaml |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2150009 is critical as it allows for remote code execution through unsafe deserialization.
To fix REDHAT-BUG-2150009, use SnakeYaml's SafeConstructor when parsing untrusted YAML content.
Ignoring REDHAT-BUG-2150009 may expose your application to remote code execution attacks.
All versions of SnakeYaml that utilize the Constructor() class for deserialization are affected by REDHAT-BUG-2150009.
Yes, REDHAT-BUG-2150009 can be exploited remotely by attackers through specially crafted YAML content.