CVE-2023-24620

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-24620
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-24620.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-24620
Aliases
Published
2023-08-25T20:15:07Z
Modified
2024-09-03T04:24:20.127610Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.

References

Affected packages

Git / github.com/esotericsoftware/yamlbeans

Affected ranges

Type
GIT
Repo
https://github.com/esotericsoftware/yamlbeans
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.07
1.11
1.12
1.13
1.14
1.15

yamlbeans-1.*

yamlbeans-1.08
yamlbeans-1.09