#SnakeYAML default usage assumed trusted input, and had a more restricted constructor.

There was a very long issue thread with multiple people arguing with the developer (some civil and making good points, some not so much) about making the default secure (assume untrusted input).

My thoughts reading the thread:
1. Rather than arguing with the developer, use the secure constructor work with scanner tooling to resolve positive.

https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in

#opensource #xz #opsec #cve
(continued)

CVE-2022-1471 (vulnerability in deserialization)

[https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471) CVE-2022-1471 was reported about a day ago and it says > SnakeYaml's Constructor\(\) class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. ‌

Before the holiday break, I started looking at CVE-2022-1471 in Confluence and Bitbucket, which led me to trying to understand how SnakeYAML deserialization vulnerabilities actually work. It was quite the ride, full of open source drama and a plethora of related vulns. I wrote it all up in this blog post:

https://www.labs.greynoise.io/grimoire/2024-01-03-snakeyaml-deserialization/

#vuln #vulnerability #poc #java #deserialization #snakeyaml #yaml

GreyNoise Labs - Panic!! At the YAML

An overview of SnakeYAML deserialiation vulnerabilities (CVE-2022-1471) - how it works, why it works, and what it affects

SnakeYaml 2.0: Solving the unsafe deserialization vulnerability https://t.co/Lo5o8SA8e8
#java #security #snakeyaml #deserialization https://t.co/HUFugtXp5g
SnakeYaml 2.0: Solving the unsafe deserialization vulnerability | Snyk

In this post, we'll walk you through using SnakeYaml 2.0 to solve the unsafe deserialization vulnerability.

Snyk

In December of last year, #Snyk reported on CVE-2022-1471 about #SnakeYaml 2.0. This unsafe deserialization problem could easily lead to arbitrary code execution under the right circumstances. @brianverm provides solutions on Foojay  Today:

https://foojay.io/today/snakeyaml-2-0-solving-the-unsafe-deserialization-vulnerability/

#foojaytip

SnakeYaml 2.0: Solving the unsafe deserialization vulnerability

In December of last year, we reported CVE-2022-1471 to you. This unsafe deserialization problem could easily lead to arbitrary code execution.

foojay

#SnakeYaml is a well-known #YAML 1.1 parser and emitter for #Java, by default in the spring-boot-starter. Recently, a vulnerability was reported for this package. This vulnerability can lead to arbitrary code execution. @brianverm from #Snyk to the rescue on Foojay  Today!

https://foojay.io/today/unsafe-deserialization-vulnerability-in-snakeyaml-cve-2022-1471/

#foojaytip

Unsafe Deserialization Vulnerability in SnakeYaml | Foojay.io

org.yaml:snakeyaml package is widely used in the Java ecosystem, in part because it is packaged by default in the spring-boot-starter.

foojay
Reading the tone of the back’n’forth in this #SnakeYaml #security issue thread is painful to read: https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in
When you see the resolution came about from a voice-to-voice call - and a smaller scoped, easier to implement solution, that was deemed acceptable to all involved presented itself - it’s good to remember that sometimes…. meetings are good.
Hopefully SnakeYaml 2.0 gets released sooner than the biannual February date.
CVE-2022-1471 (vulnerability in deserialization)

[https://nvd.nist.gov/vuln/detail/CVE-2022-1471](https://nvd.nist.gov/vuln/detail/CVE-2022-1471) CVE-2022-1471 was reported about a day ago and it says > SnakeYaml's Constructor\(\) class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization. ‌

Wow. Genau so sollte man als Library-Entwickler mit ernsthaften Sicherheitslücken nicht umgehen. https://bitbucket.org/snakeyaml/snakeyaml/commits/5735ec7ca65a68da96083c34accbffb4fa0985b3 #snakeyaml #security
snakeyaml / snakeyaml - 5735ec7

Add CVE clarification

🚨 SnakeYaml, a YAML parser and emitter for Java, has a vulnerability that allows arbitrary code execution.

The flaw in its Constructor class doesn't restrict deserialized types. Learn more about this vulnerability: https://buff.ly/3iQxvqy

#Java #SnakeYaml #vulnerability #cve

Unsafe deserialization in SnakeYaml - Exploring CVE-2022-1471 | Snyk

SnakeYaml, a YAML 1.1 parser and emitter for Java, has been reported as vulnerable to CVE-2022-1471, a deserialization vulnerability that can lead to arbitrary code execution.

Snyk
SnakeYaml, a YAML parser and emitter for Java, has a vulnerability that allows arbitrary code execution. The flaw in its Constructor class doesn't restrict deserialized types. Learn more about this vulnerability: https://t.co/iPENynt41h
#Java #SnakeYaml #securityvulnerability https://t.co/3Kbq1IaZM3
Unsafe deserialization in SnakeYaml - Exploring CVE-2022-1471 | Snyk

SnakeYaml, a YAML 1.1 parser and emitter for Java, has been reported as vulnerable to CVE-2022-1471, a deserialization vulnerability that can lead to arbitrary code execution.

Snyk

⚠️ A vulnerability for #SnakeYaml, a well-known #YAML 1.1 parser and emitter for #Java, was recently reported https://snyk.io/blog/unsafe-deserialization-snakeyaml-java-cve-2022-1471/

Learn how CVE-2022-1471 can lead to arbitrary code execution and how best to mitigate it from
@brianverm

Unsafe deserialization in SnakeYaml - Exploring CVE-2022-1471 | Snyk

SnakeYaml, a YAML 1.1 parser and emitter for Java, has been reported as vulnerable to CVE-2022-1471, a deserialization vulnerability that can lead to arbitrary code execution.

Snyk