CVE-2023-24621

An issue was discovered in Esoteric YamlBeans through 1.15. It allows untrusted deserialisation to Java classes by default, where the data and class are controlled by the author of the YAML document being processed.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*

History

31 Aug 2023, 13:07

Type Values Removed Values Added
References (MISC) https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md - (MISC) https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md - Exploit, Third Party Advisory
References (MISC) https://github.com/EsotericSoftware - (MISC) https://github.com/EsotericSoftware - Third Party Advisory
References (MISC) https://contrastsecurity.com - (MISC) https://contrastsecurity.com - Third Party Advisory
First Time Esotericsoftware yamlbeans
Esotericsoftware
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:a:esotericsoftware:yamlbeans:*:*:*:*:*:*:*:*
CWE CWE-502

25 Aug 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-25 20:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-24621

Mitre link : CVE-2023-24621

CVE.ORG link : CVE-2023-24621


JSON object : View

Products Affected

esotericsoftware

  • yamlbeans
CWE
CWE-502

Deserialization of Untrusted Data