Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:3126
HistoryDec 16, 2016 - 8:05 a.m.

Remote Code Execution (RCE)

2016-12-1608:05:27
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
16

EPSS

0.017

Percentile

87.9%

RESTEasy is vulnerable to remote code execution. SnakeYAML unmarshalling is exploitable for code execution. As RESTeasy uses SnakeYAML and enables the yaml provider by default, under certain conditions, RESTEasy could be forced to parse a request with YamlProvider, resulting in unmarshalling of potentially untrusted data. An attacker can exploit it to execute arbitrary code with the permissions of the application using RESTEasy.