logo

CVE-2023-24620 com.esotericsoftware.yamlbeans:yamlbeans

Package

Manager: maven
Name: com.esotericsoftware.yamlbeans:yamlbeans
Vulnerable Version: >=0 <=1.15

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00021 pctl0.04107

Details

Esoteric YamlBeans XML Entity Expansion vulnerability An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.

Metadata

Created: 2023-08-25T21:30:48Z
Modified: 2023-09-01T17:35:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-vj49-j7rc-h54f/GHSA-vj49-j7rc-h54f.json
CWE IDs: ["CWE-400", "CWE-611"]
Alternative ID: GHSA-vj49-j7rc-h54f
Finding: F083
Auto approve: 1