The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it does not properly control the number of recursive definitions of entities.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JAVA-ORGYAML-2806360 | patch third party advisory exploit |
https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174 | third party advisory patch |
https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174 | third party advisory patch |
https://bitbucket.org/snakeyaml/snakeyaml/issues/525 | third party advisory issue tracking exploit |
https://lists.debian.org/debian-lts-announce/2022/10/msg00001.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20240315-0010/ |