- Description
- An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-502
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AA60B6AE-695A-4791-88C5-576BDEEA4FE4",
"versionEndIncluding": "1.15"
}
],
"operator": "OR"
}
]
}
]