CVE-2023-24621 – com.esotericsoftware.yamlbeans:yamlbeans
Package
Manager: maven
Name: com.esotericsoftware.yamlbeans:yamlbeans
Vulnerable Version: >=0 <=1.15
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00034 pctl0.08279
Details
Esoteric YamlBeans Unsafe Deserialization vulnerability An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Metadata
Created: 2023-08-25T21:30:47Z
Modified: 2023-08-31T18:55:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-jm7r-4pg6-gf26/GHSA-jm7r-4pg6-gf26.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-jm7r-4pg6-gf26
Finding: F096
Auto approve: 1