logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2022-1471

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2022-1471

Description:
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. We recommend upgrading to version 2.0 and beyond.
Last updated date:
02/13/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
12/06/2022
Reference url to background

https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/11/2023
Reference url to background

https://github.com/mbechler/marshalsec

Type:
exploit
Confidence:
HIGH
Date of publishing:
02/11/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
03/02/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
05/08/2023
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/11/2023
Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy