logo

CVE-2023-24621 com.esotericsoftware.yamlbeans:yamlbeans

Package

Manager: maven
Name: com.esotericsoftware.yamlbeans:yamlbeans
Vulnerable Version: >=0 <=1.15

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00034 pctl0.08279

Details

Esoteric YamlBeans Unsafe Deserialization vulnerability An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

Metadata

Created: 2023-08-25T21:30:47Z
Modified: 2023-08-31T18:55:02Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-jm7r-4pg6-gf26/GHSA-jm7r-4pg6-gf26.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-jm7r-4pg6-gf26
Finding: F096
Auto approve: 1