Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-1471
HistoryDec 01, 2022 - 12:00 a.m.

CVE-2022-1471

2022-12-0100:00:00
ubuntu.com
ubuntu.com
67
snakeyaml
deserialization
vulnerability
safeconstructor
remote code execution
upgrade
cve-2022-1471

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.021

Percentile

89.3%

SnakeYaml’s Constructor() class does not restrict types which can be
instantiated during deserialization. Deserializing yaml content provided by
an attacker can lead to remote code execution. We recommend using
SnakeYaml’s SafeConsturctor when parsing untrusted content to restrict
deserialization. We recommend upgrading to version 2.0 and beyond.

Bugs

Notes

Author Note
eslerm upstream bug report declares this a documentation issue

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.021

Percentile

89.3%