CVE-2022-41854
Denial of Service vulnerability in snakeyaml (Maven)
What is CVE-2022-41854 About?
This is a Denial of Service (DoS) vulnerability in Snakeyaml when parsing untrusted YAML files. An attacker can supply malicious YAML content that causes a stack overflow, leading to an application crash. Exploitation is straightforward for an attacker able to provide YAML input.
Affected Software
Technical Details
The vulnerability in Snakeyaml occurs during the parsing of user-supplied YAML files. If an attacker provides a YAML document containing complex, deeply nested, or highly recursive structures, the parser's recursive descent processing can lead to an excessive consumption of stack memory. This continuous recursive processing without sufficient depth limits eventually triggers a stack overflow. The stack overflow causes the parsing process to terminate abruptly, leading to the application using Snakeyaml to crash and resulting in a Denial of Service.
What is the Impact of CVE-2022-41854?
Successful exploitation may allow attackers to crash the application, disrupting service availability and leading to a denial of service for legitimate users.
What is the Exploitability of CVE-2022-41854?
Exploitation of this Denial of Service vulnerability is relatively simple, requiring the attacker to provide a specially crafted YAML file. No specific authentication or elevated privileges are needed, as long as the attacker can supply input to the YAML parser. The attack is typically remote if the application accepts YAML input over a network interface. The primary condition for exploitation is that the application uses Snakeyaml to parse untrusted input. The risk of exploitation increases when applications directly expose YAML parsing functionality to external users without implementing robust input validation, recursion limits, or resource constraints.
What are the Known Public Exploits?
| PoC Author | Link | Commentary |
|---|---|---|
| No known exploits | ||
What are the Available Fixes for CVE-2022-41854?
Available Upgrade Options
- org.yaml:snakeyaml
- <1.32 → Upgrade to 1.32
Struggling with dependency upgrades?
See how Resolved Security's drop-in replacements make it simple.
Book a demoAdditional Resources
- https://security.netapp.com/advisory/ntap-20240621-0006
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3DDXEXXWAZGF5AVHIPGFPXIWL6TSMKJE/
- https://security.netapp.com/advisory/ntap-20240315-0009
- https://osv.dev/vulnerability/GHSA-w37g-rhq8-7m4j
- https://security.netapp.com/advisory/ntap-20240315-0009/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MKE4XWRXTH32757H7QJU4ACS67DYDCR
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MKE4XWRXTH32757H7QJU4ACS67DYDCR/
- https://bitbucket.org/snakeyaml/snakeyaml
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KSPAJ5Y45A4ZDION2KN5RDWLHK4XKY2J/
What are Similar Vulnerabilities to CVE-2022-41854?
Similar Vulnerabilities: CVE-2020-14301 , CVE-2019-14439 , CVE-2017-18640 , CVE-2017-7679 , CVE-2016-1000005
