[
https://issues.apache.org/jira/browse/CASSANDRA-18149?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17675731#comment-17675731
]
Brandon Williams commented on CASSANDRA-18149:
----------------------------------------------
CVE-2021-4235: https://nvd.nist.gov/vuln/detail/CVE-2021-4235 Denial of
service vector, which isn't a concern.
CVE-2022-1471: https://nvd.nist.gov/vuln/detail/CVE-2022-1471 RCE through the
Constructor() class. It is recommended to use the SafeConstructor() class
instead. I've created CASSANDRA-18150 to handle that.
CVE-2022-3064: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3064
parsing malicious yaml can cause a DoS, again not a concern.
> snakeyaml vulnerabilities: CVE-2021-4235, CVE-2022-1471, CVE-2022-3064
> ----------------------------------------------------------------------
>
> Key: CASSANDRA-18149
> URL: https://issues.apache.org/jira/browse/CASSANDRA-18149
> Project: Cassandra
> Issue Type: Bug
> Components: Dependencies
> Reporter: Brandon Williams
> Assignee: Brandon Williams
> Priority: Normal
> Fix For: 3.0.x, 3.11.x, 4.0.x, 4.1.x, 4.x
>
>
> The OWASP scan is reporting these for both snakeyaml-1.11 and snakeyaml-1.26.
> These are similar to CASSANDRA-17907 in that they require access to the yaml
> to have any effect.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]