-
Notifications
You must be signed in to change notification settings - Fork 0
Description
Checkmarx (SCA): Vulnerable Package
Vulnerability: Read More about CVE-2022-38749
Checkmarx Project: jerp1979/java-faker
Repository URL: https://github.com/jerp1979/java-faker
Branch: master
Scan ID: 8f3fa71f-fe46-4bc8-9378-781a0403538e
Using snakeYAML before 1.31 parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This CVE is duplicating CVE-2022-25857. Checkmarx analyzed this thoroughly to understand if there was a difference between the CVEs but they reference the same issue and the fix is exactly the same.
Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: NONE
Availability impact: HIGH
Remediation Upgrade Recommendation: 1.33.0.redhat-00002