An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://github.com/EsotericSoftware | third party advisory |
https://contrastsecurity.com | third party advisory |
https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md | third party advisory exploit |