Severity
5.5MEDIUM
EPSS
0.2%
top 63.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateMar 10

Description

Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

Mavenorg.yaml:snakeyaml< 1.31
CVEListV5snakeyaml/snakeyamlunspecified1.31
Debiansnakeyaml< 1.28-1+deb11u1+3
Ubuntusnakeyaml< 1.23-1+deb10u1build0.18.04.1+4

Also affects: Debian Linux 10.0

🔴Vulnerability Details

5
OSV
snakeyaml vulnerabilities2023-03-10
OSV
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write2022-09-06
GHSA
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write2022-09-06
CVEList
DoS in SnakeYAML2022-09-05
OSV
CVE-2022-38750: Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS)2022-09-05

📋Vendor Advisories

4
Ubuntu
SnakeYAML vulnerabilities2023-03-10
Microsoft
DoS in SnakeYAML2022-09-13
Red Hat
snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject2022-09-05
Debian
CVE-2022-38750: snakeyaml - Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Ser...2022