CVE-2023-24621

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:48

Type Values Removed Values Added
References () https://contrastsecurity.com - Third Party Advisory () https://contrastsecurity.com - Third Party Advisory
References () https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md - Exploit, Third Party Advisory () https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md - Exploit, Third Party Advisory
References () https://github.com/EsotericSoftware - Third Party Advisory () https://github.com/EsotericSoftware - Third Party Advisory
Summary
  • (es) Se descubrió un problema en YamlBeans de Esoteric a través de 1.15. Permite la deserialización no confiable a clases Java de forma predeterminada, donde los datos y la clase son controlados por el autor del documento YAML que se está procesando.

Information

Published : 2023-08-25 20:15

Updated : 2024-11-21 07:48


NVD link : CVE-2023-24621

Mitre link : CVE-2023-24621

CVE.ORG link : CVE-2023-24621


JSON object : View

Products Affected

esotericsoftware

  • yamlbeans
CWE
CWE-502

Deserialization of Untrusted Data