CVE-2021-4235Uncontrolled Resource Consumption in Yaml.v2 Gopkg.in Yaml.v2

Severity
5.5MEDIUMNVD
EPSS
0.0%
top 90.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 27
Latest updateAug 14

Description

Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Gogopkg.in/yaml.v2< 2.2.3
NVDyaml_project/yaml< 2.2.3
debiandebian/golang-yaml.v2< golang-yaml.v2 2.2.8-1 (bookworm)

Patches

🔴Vulnerability Details

5
OSV
golang-yaml.v2 vulnerabilities2023-08-14
OSV
YAML Go package vulnerable to denial of service2022-12-28
GHSA
YAML Go package vulnerable to denial of service2022-12-28
OSV
CVE-2021-4235: Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources2022-12-27
OSV
Denial of service in gopkg.in/yaml.v22021-04-14

📋Vendor Advisories

4
Ubuntu
Go yaml vulnerabilities2023-08-14
Red Hat
go-yaml: Denial of Service in go-yaml2022-12-27
Microsoft
Denial of service in gopkg.in/yaml.v22022-12-13
Debian
CVE-2021-4235: golang-yaml.v2 - Due to unbounded alias chasing, a maliciously crafted YAML file can cause the sy...2021
CVE-2021-4235 — Uncontrolled Resource Consumption | cvebase