CVE-2023-24621

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-24621
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-24621.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-24621
Aliases
Published
2023-08-25T20:15:07Z
Modified
2024-09-03T04:24:22.092125Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.

References

Affected packages

Git / github.com/esotericsoftware/yamlbeans

Affected ranges

Type
GIT
Repo
https://github.com/esotericsoftware/yamlbeans
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.07
1.11
1.12
1.13
1.14
1.15

yamlbeans-1.*

yamlbeans-1.08
yamlbeans-1.09