CVE-2016-8744

Severity
8.8HIGH
EPSS
0.5%
top 35.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 13
Latest updateMay 17

Description

Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs. SnakeYAML allows the use of YAML tags to indicate that SnakeYAML should unmarshal data to a Java type. In the default configuration in Brooklyn before 0.10.0, SnakeYAML will allow unmarshalling to any Java type available on the classpath. This could provide an authenticated user with a means to cause the JVM running Brooklyn to load and run Java code without detection by Brooklyn. Such code would have the privileges of the Java

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDapache/brooklyn0.9.0
CVEListV5apache_software_foundation/apache_brooklyn0.9.0 and all prior versions

🔴Vulnerability Details

3
GHSA
Deserialization of Untrusted Data in Apache Brooklyn2022-05-17
OSV
Deserialization of Untrusted Data in Apache Brooklyn2022-05-17
CVEList
CVE-2016-8744: Apache Brooklyn uses the SnakeYAML library for parsing YAML inputs2017-09-13

💬Community

1
Bugzilla
CVE-2015-8744 Qemu: net: vmxnet3: incorrect l2 header validation leads to a crash via assert(2) call2015-10-12
CVE-2016-8744 (HIGH CVSS 8.8) | Apache Brooklyn uses the SnakeYAML | cvebase.io