An issue was discovered in Esoteric YamlBeans through 1.15. A crafted YAML document is able perform am XML Entity Expansion attack against YamlBeans YamlReader. By exploiting the Anchor feature in YAML, it is possible to generate a small YAML document that, when read, is expanded to a large size, causing CPU and memory consumption, such as a Java Out-of-Memory exception.
References
Link | Resource |
---|---|
https://contrastsecurity.com | Third Party Advisory |
https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md | Exploit Third Party Advisory |
https://github.com/EsotericSoftware | Third Party Advisory |
https://contrastsecurity.com | Third Party Advisory |
https://github.com/Contrast-Security-OSS/yamlbeans/blob/main/SECURITY.md | Exploit Third Party Advisory |
https://github.com/EsotericSoftware | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-25 20:15
Updated : 2024-11-21 07:48
NVD link : CVE-2023-24620
Mitre link : CVE-2023-24620
CVE.ORG link : CVE-2023-24620
JSON object : View
Products Affected
esotericsoftware
- yamlbeans
CWE
CWE-611
Improper Restriction of XML External Entity Reference