Skip to content

CVE-2022-41854 @ Maven-org.yaml:snakeyaml-1.26 #12

@jerp1979

Description

@jerp1979

Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2022-41854
Checkmarx Project: jerp1979/java-faker
Repository URL: https://github.com/jerp1979/java-faker
Branch: master
Scan ID: 8f3fa71f-fe46-4bc8-9378-781a0403538e


Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser runs on user-supplied input, an attacker may supply content that causes the parser to crash by stack overflow. It affects versions of "org.yaml:snakeyaml" prior to 1.32.


Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: NONE
Availability impact: HIGH
Remediation Upgrade Recommendation: 1.33.0.redhat-00002

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions